Sciweavers

675 search results - page 9 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
MSWIM
2005
ACM
14 years 28 days ago
Authentication protocols for ad hoc networks: taxonomy and research issues
Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweis...
INFOCOM
2005
IEEE
14 years 29 days ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
WINET
2010
133views more  WINET 2010»
13 years 5 months ago
Connectivity of ad hoc wireless networks: an alternative to graph-theoretic approaches
Connectivity in wireless ad hoc and sensor networks is typically analyzed using a graph-theoretic approach. In this paper, we investigate an alternative communication-theoretic app...
Sooksan Panichpapiboon, Gian Luigi Ferrari, Ozan K...
ADHOCNOW
2009
Springer
13 years 5 months ago
A Decentralized Approach to Minimum-Energy Broadcasting in Static Ad Hoc Networks
Broadcasting is a commonly used feature in wireless networking, e.g. for file distribution, re-tasking, event notification, or miscellaneous maintenance. Due to the limited resourc...
Christopher Miller, Christian Poellabauer
JSAC
2006
156views more  JSAC 2006»
13 years 7 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson