Abstract--We consider the use of threshold signatures in adhoc and dynamic groups such as MANETs ("mobile ad-hoc networks"). We first show that known threshold RSA signat...
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal R...
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...
Abstract—Delay-reliability (D-R), and throughput-delayreliability (T-D-R) tradeoffs in an ad hoc network are derived for single hop and multi-hop transmission with automatic repe...
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administra...
Josh Broch, David A. Maltz, David B. Johnson, Yih-...
Multicast protocols for MANET typically construct a tree or mesh structure for multicast message distribution. Typical implementations impose scalability and efficiency limitation...