Topology management schemes conserve energy in wireless ad hoc networks by identifying redundant nodes that may turn off their radios or other components while maintaining connec...
We consider the problem of scheduling emergency responders to geospatially located finite duration temporally bounded tasks. We consider two different schedulers, Greedy and Mee...
In this paper, we examine one of the security issues in vehicular ad-hoc network (VANETs): position-spoofing attack. We propose a novel Secure Location Verification (SLV) scheme to...
Joo-Han Song, Victor W. S. Wong, Vincent C. M. Leu...
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
VoIP is one of the traditional application scenarios for Mobile Ad Hoc Networks (MANETs) in settings such as emergency response. Ideally, VoIP would be transparent to the network ...