Sciweavers

96 search results - page 11 / 20
» Key management in wireless ad hoc networks: collusion analys...
Sort
View
JCP
2006
110views more  JCP 2006»
13 years 8 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
CIIT
2004
141views Communications» more  CIIT 2004»
13 years 10 months ago
Dilemma of using high datarate in IEEE 802.11B based multihop ad hoc networks
Due to the fact that high datarate has shorter transmission range, the benefit of using high datarate may be degraded for IEEE 802.11 based multihop ad hoc networks. In this paper...
Frank Yong Li, Andreas Hafslund, Mariann Hauge, Pa...
ADHOCNOW
2005
Springer
14 years 2 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
ICICS
2004
Springer
14 years 2 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
CORR
2010
Springer
437views Education» more  CORR 2010»
13 years 6 months ago
A Distributed Cluster Scheme For Bandwidth Management In Multi-hop MANETs
Electronic collaboration among devices in a geographically localized environment is made possible with the implementation of IEEE 802.11 based wireless ad hoc networks. Dynamic na...
Binod Kumar Pattanayak, Alok Kumar Jagadev, Manoj ...