Sciweavers

669 search results - page 82 / 134
» Minimizing interference in ad hoc and sensor networks
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
SASN
2006
ACM
14 years 1 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
VTC
2006
IEEE
136views Communications» more  VTC 2006»
14 years 1 months ago
M3RP: Multi-rate/Multi-range Multicast Routing Protocol for Mobile Ad Hoc Networks
— Group Communication services have become more and more important in mobile ad hoc networks (MANETs). The use of multicast transmission techniques in MANETs has been shown to ha...
Jenhui Chen, Jhenjhong Guo, Chih-Chieh Wang
ITCC
2005
IEEE
14 years 1 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
ADHOCNOW
2008
Springer
14 years 2 months ago
Adapting BitTorrent to Wireless Ad Hoc Networks
Abstract. BitTorrent is one of the Internet’s most efficient content distribution protocols. It is known to perform very well over the wired Internet where end-to-end performance...
Mohamed Karim Sbai, Chadi Barakat, Jaeyoung Choi, ...