Sciweavers

433 search results - page 16 / 87
» Design and Implementation of a TCP-Friendly Transport Protoc...
Sort
View
IANDC
2008
84views more  IANDC 2008»
13 years 7 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
WD
2010
13 years 6 months ago
Beamforming for heterogeneously equipped nodes in wireless ad hoc networks
It has long been known that adaptive beamforming has the potential to enhance the performance of wireless ad hoc networks significantly. However, due to the decentralized nature of...
Ulrike Korger, Manuel Wocheslander, Christian Hart...
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
14 years 3 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
INFOCOM
2003
IEEE
14 years 2 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
TRIDENTCOM
2005
IEEE
14 years 2 months ago
A Testbed and Methodology for Experimental Evaluation of Wireless Mobile Ad hoc Networks
Wireless mobile ad hoc network experimentation is subjected to stochastic factors from the radio environment and node mobility. To achieve test repeatability and result reproducib...
Erik Nordström, Per Gunningberg, Henrik Lundg...