Sciweavers

1990 search results - page 245 / 398
» Anonymous communications in mobile ad hoc networks
Sort
View
GLOBECOM
2008
IEEE
13 years 9 months ago
Secure Location Verification for Vehicular Ad-Hoc Networks
In this paper, we examine one of the security issues in vehicular ad-hoc network (VANETs): position-spoofing attack. We propose a novel Secure Location Verification (SLV) scheme to...
Joo-Han Song, Victor W. S. Wong, Vincent C. M. Leu...
INFOCOM
2010
IEEE
13 years 7 months ago
Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks with Elastic and Inelastic Traffic
This paper studies the problem of congestion control and scheduling in ad hoc wireless networks that have to support a mixture of best-effort and real-time traffic. Optimization an...
Juan José Jaramillo, R. Srikant
ICC
2009
IEEE
153views Communications» more  ICC 2009»
14 years 4 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
ICCCN
2007
IEEE
14 years 3 months ago
Localized detection of k-connectivity in wireless ad hoc, actuator and sensor networks
- Ad hoc, actuator and sensor wireless networks normally have critical connectivity properties before becoming fault intolerant. Existing algorithms for testing k-connectivity are ...
Milenko Jorgic, Nishith Goel, Kalai Kalaichelvan, ...
JSAC
2011
137views more  JSAC 2011»
13 years 4 days ago
A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Yen-Cheng Lai, Phone Lin, Wanjiun Liao, Chung-Min ...