Sciweavers

133 search results - page 12 / 27
» Neutralization of Errors and Attacks in Wireless Ad Hoc Netw...
Sort
View
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 6 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
IPCCC
2005
IEEE
14 years 10 days ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
BROADNETS
2007
IEEE
14 years 1 months ago
Goodput optimization in CSMA/CA wireless networks
—Packet based wireless networks have provided high data rates, and the desire for ubiquitous wireless computing is growing rapidly. To accommodate these demands, wireless systems...
Yusun Chang, Christopher P. Lee, John A. Copeland
ADHOCNOW
2005
Springer
14 years 8 days ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
ENTCS
2006
173views more  ENTCS 2006»
13 years 6 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin