Sciweavers

1970 search results - page 159 / 394
» Node Localisation in Wireless Ad Hoc Networks
Sort
View
GLOBECOM
2007
IEEE
15 years 11 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
ICC
2007
IEEE
229views Communications» more  ICC 2007»
15 years 10 months ago
CD-MAC: Cooperative Diversity MAC for Robust Communication in Wireless Ad Hoc Networks
— This paper proposes a medium access control (MAC) algorithm, called Cooperative Diversity MAC (CD-MAC), which exploits the cooperative communication capability to improve robus...
Sangman Moh, Chansu Yu, Seung-Min Park, Heung-Nam ...
APNOMS
2006
Springer
15 years 8 months ago
QoS-Aware Fair Scheduling in Wireless Ad Hoc Networks with Link Errors
To provide scheduling in wireless ad hoc networks, that is both highly efficient and fair in resource allocation, is not a trivial task because of the unique problems in wireless n...
Muhammad Mahbub Alam, Md. Mamun-Or-Rashid, Choong ...
PERCOM
2007
ACM
16 years 4 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
KIVS
2005
Springer
15 years 10 months ago
Hypergossiping: A Generalized Broadcast Strategy for Mobile Ad Hoc Networks
Broadcasting is a commonly used communication primitive needed by many applications and protocols in mobile ad hoc networks (MANETs). Unfortunately, most broadcast solutions are ta...
Abdelmajid Khelil, Pedro José Marrón...