Sciweavers

333 search results - page 24 / 67
» An optimized authentication protocol for mobile network reco...
Sort
View
IWCMC
2010
ACM
13 years 10 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...
WIMOB
2007
IEEE
14 years 2 months ago
A Fault Resilient Routing Protocol for Mobile Ad-Hoc Networks
— In a Mobile Ad hoc NETwork (MANET), mobile devices cooperate to forward packets for each other without the assistance of dedicated routing infrastructures. Due to its networkin...
Sirisha Medidi, Jiong Wang
TWC
2008
245views more  TWC 2008»
13 years 8 months ago
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Networks
In order to adapt to time-varying wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in mobile/wireless ad hoc networks w...
Jing Ai, Alhussein A. Abouzeid, Zhenzhen Ye
ACMSE
2006
ACM
14 years 2 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
INFOCOM
2003
IEEE
14 years 1 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson