Sciweavers

1970 search results - page 237 / 394
» Node Localisation in Wireless Ad Hoc Networks
Sort
View
MOBICOM
2004
ACM
15 years 10 months ago
Initializing newly deployed ad hoc and sensor networks
A newly deployed multi-hop radio network is unstructured and lacks a reliable and efficient communication scheme. In this paper, we take a step towards analyzing the problems exis...
Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer
MASCOTS
2007
15 years 6 months ago
A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks
—We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current s...
François Ingelrest, Nathalie Mitton, David ...
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 11 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
AINA
2009
IEEE
15 years 11 months ago
A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc Networks
Carrier Sense Multiple Access / ID Countdown (CSMA/IC) is a collision-free ad hoc MAC protocol. CSMA/IC avoids simultaneous medium access by competing with a local unique ID assig...
Ki-seok Lee, Cheeha Kim
ICCCN
2008
IEEE
15 years 11 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...