Sciweavers

389 search results - page 22 / 78
» An ad hoc networking scheme in hybrid networks for emergency...
Sort
View
GLOBECOM
2009
IEEE
13 years 11 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
PERCOM
2005
ACM
14 years 7 months ago
Enabling Reliable Many-to-Many Communication in Ad-Hoc Pervasive Environments
In order for pervasive computing to realize its full potential, pervasive applications have to be able to operate without support from fixed communication infrastructure at least ...
Einar Vollset, Paul D. Ezhilchelvan
IAJIT
2008
145views more  IAJIT 2008»
13 years 7 months ago
NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks
: A Mobile Ad Hoc Network (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies without...
Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Md...
GLOBECOM
2006
IEEE
14 years 1 months ago
Adaptive Multi-Copy Routing for Intermittently Connected Mobile Ad Hoc Networks
— Intermittently Connected Mobile Ad Hoc Networks (ICMANs) are mobile networks in which complete source-todestination paths do not exist most of the time because of their sparse ...
Zhuoqun Li, Lingfen Sun, Emmanuel C. Ifeachor
SECPERU
2006
IEEE
14 years 1 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos