Sciweavers

182 search results - page 24 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
MWCN
2004
Springer
14 years 1 months ago
The Receiver's Dilemma
In Mobile Ad Hoc Networks (MANETs), each node has the capacity to act as a router. The performance of the MANET relies on how well the nodes perform this function. In simulations,...
John P. Mullen, Timothy Matis, Smriti Rangan
GLOBECOM
2007
IEEE
14 years 2 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
SIGCOMM
2009
ACM
14 years 3 months ago
MobiClique: middleware for mobile social networking
We consider a mobile ad hoc network setting where Bluetooth enabled mobile devices communicate directly with other devices as they meet opportunistically. We design and implement ...
Anna Kaisa Pietiläinen, Earl Oliver, Jason Le...
ICDE
2006
IEEE
108views Database» more  ICDE 2006»
14 years 10 months ago
Skyline Queries Against Mobile Lightweight Devices in MANETs
Skyline queries are well suited when retrieving data according to multiple criteria. While most previous work has assumed a centralized setting this paper considers skyline queryi...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...
GLOBECOM
2008
IEEE
14 years 3 months ago
COMB: Cell Based Orientation Aware MANET Broadcast MAC Layer
—The design of a collision avoidance system for trains implies the design of a MAC layer for their specific requirements. It should be efficient, reliable, use broadcast and su...
Cristina Rico Garcia, Andreas Lehner, Thomas Stran...