Sciweavers

454 search results - page 26 / 91
» An Authenticated Broadcasting Scheme for Wireless Ad Hoc Net...
Sort
View
ADHOCNOW
2004
Springer
14 years 1 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
JCM
2008
121views more  JCM 2008»
13 years 7 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 7 months ago
Throughput-Delay Trade-off for Hierarchical Cooperation in Ad Hoc Wireless Networks
Hierarchical cooperation has recently been shown to achieve better throughput scaling than classical multihop schemes in static wireless networks. However, the end-to-end delay of ...
Ayfer Özgür, Olivier Lévêqu...
ISCIS
2004
Springer
14 years 1 months ago
Multicast Routing for Ad Hoc Networks with a Multiclass Scheme for Quality of Service
As multimedia- and group-oriented computing becomes increasingly popular for the users of wireless mobile networks, the importance of features like quality of service (QoS) and mul...
Kaan Bür, Cem Ersoy
WS
2003
ACM
14 years 26 days ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe