Sciweavers

3370 search results - page 111 / 674
» Adding Networks
Sort
View
SECON
2008
IEEE
14 years 4 months ago
Decentralized Tick Synchronization for Multi-Hop Medium Slotting in Wireless Ad Hoc Networks Using Black Bursts
—In this paper, we present Black Burst Synchronization (BBS)1 , a novel protocol for decentralized network-wide tick synchronization in wireless ad hoc networks, located at MAC l...
Reinhard Gotzhein, Thomas Kuhn
JDCTA
2010
150views more  JDCTA 2010»
13 years 4 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
WS
2003
ACM
14 years 3 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ICC
2007
IEEE
134views Communications» more  ICC 2007»
14 years 4 months ago
A MAC Protocol for Maximum Stream Allocation Depending on the Number of Antennas and Received RTS Packets in MIMO Ad Hoc Network
— MIMA-MAC is the most attractive MAC protocol for MIMO ad hoc networks, which consist of nodes with multiple antennas. MIMA-MAC, however, uses only a half of antennas for data t...
Motoki Shirasu, Iwao Sasase
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 4 months ago
Media Access Control with Spatial Correlation for MIMO Ad Hoc Networks
– MIMO (Multiple Input Multiple Output) is capable of offering several-fold increase in spectral efficiency over singleantenna systems through spatial processing. However, curren...
Bing Wen Ke, Ying Jun Zhang, Soung Chang Liew