Sciweavers

182 search results - page 25 / 37
» Forming the COUNCIL Based Clusters in Securing Wireless Ad H...
Sort
View
TDSC
2011
13 years 2 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 1 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
VTC
2006
IEEE
136views Communications» more  VTC 2006»
14 years 1 months ago
M3RP: Multi-rate/Multi-range Multicast Routing Protocol for Mobile Ad Hoc Networks
— Group Communication services have become more and more important in mobile ad hoc networks (MANETs). The use of multicast transmission techniques in MANETs has been shown to ha...
Jenhui Chen, Jhenjhong Guo, Chih-Chieh Wang
FGIT
2010
Springer
13 years 5 months ago
Improved Location Aided Cluster Based Routing Protocol for GPS Enabled Manets
Routing has been the main challenge for ad hoc networks due to dynamic topology as well as resource constraints. Completely GPS free as well as GPS scarce positioning systems for ...
S. Mangai, A. Tamilarasi
IJWIN
2006
119views more  IJWIN 2006»
13 years 7 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...