Sciweavers

612 search results - page 68 / 123
» Engineering Incentive Schemes for Ad Hoc Networks
Sort
View
ADHOCNOW
2005
Springer
14 years 1 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
TMC
2008
152views more  TMC 2008»
13 years 7 months ago
CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks
In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directio...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
ITCC
2005
IEEE
14 years 1 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 7 months ago
The effect of fading, channel inversion, and threshold scheduling on ad hoc networks
—This paper addresses three issues in the field of ad hoc network capacity: the impact of i) channel fading, ii) channel inversion power control, and iii) threshold–based sche...
Steven Weber, Jeffrey G. Andrews, Nihar Jindal
ICDCS
2011
IEEE
12 years 7 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang