Sciweavers

777 search results - page 72 / 156
» On Secure Mobile Ad hoc Routing
Sort
View
DSRT
2006
IEEE
14 years 3 months ago
Speedup-Precision Tradeoffs in Time-Parallel Simulation of Wireless Ad hoc Networks
In this paper, we report on a series of experiments involving the speedups obtainable with time-parallel simulation of wireless ad hoc networks. A mobile ad hoc network scenario i...
Damla Turgut, Guoqiang Wang, Ladislau Böl&oum...
ICDCS
2011
IEEE
12 years 8 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
MOBICOM
1998
ACM
14 years 1 months ago
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administra...
Josh Broch, David A. Maltz, David B. Johnson, Yih-...
IJSNET
2007
91views more  IJSNET 2007»
13 years 9 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
ADHOC
2005
125views more  ADHOC 2005»
13 years 9 months ago
Security considerations in ad hoc sensor networks
In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena. As sensor networks c...
Fei Hu, Neeraj K. Sharma