Sciweavers

1970 search results - page 223 / 394
» Node Localisation in Wireless Ad Hoc Networks
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
14 years 11 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
EURONGI
2004
Springer
15 years 10 months ago
A Family of Encounter-Based Broadcast Protocols for Mobile Ad-Hoc Networks
A family of message propagation protocols for highly mobile ad-hoc networks is defined, and is studied analytically and by simulation. The coverage of a message (the fraction of n...
Dave E. Cooper, Paul D. Ezhilchelvan, Isi Mitrani
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 11 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
ICDCS
2005
IEEE
15 years 10 months ago
Location Estimation in Ad Hoc Networks with Directional Antennas
With the development of location aware sensor applications, location determination has become an increasingly important middleware technology. Numerous current technologies for lo...
Nipoon Malhotra, Mark D. Krasniewski, Chin-Lung Ya...
WOWMOM
2005
ACM
113views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
High Throughput Routing in Hybrid Cellular and Ad-Hoc Networks
—Hybrid networks are a promising architecture that builds ad hoc, wireless networks around the existing cellular telephony infrastructure. In this paper we present DST, a routing...
Ioannis Ioannidis, Bogdan Carbunar, Cristina Nita-...