Sciweavers

777 search results - page 95 / 156
» On Secure Mobile Ad hoc Routing
Sort
View
VTC
2006
IEEE
179views Communications» more  VTC 2006»
14 years 3 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu
MOBICOM
1999
ACM
14 years 1 months ago
Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol
An ad-hoc network is the cooperative engagement of a collection of typically wireless mobile nodes without the required intervention of any centralized access point or existing ...
Elizabeth M. Belding-Royer, Charles E. Perkins
SUTC
2006
IEEE
14 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
MATA
2005
Springer
192views Communications» more  MATA 2005»
14 years 2 months ago
A Cross-Layer Approach for Publish/Subscribe in Mobile Ad Hoc Networks
Abstract. In the context of ubiquitous and pervasive computing, publish/subscribe middleware is gaining momentum due to its loosely coupled communication scheme. In this paper we p...
Marco Avvenuti, Alessio Vecchio, Giovanni Turi
ICDCIT
2005
Springer
14 years 2 months ago
Merging Clustering Algorithms in Mobile Ad Hoc Networks
Abstract. Clustering is a widely used approach to ease implementation of various problems such as routing and resource management in mobile ad hoc networks (MANET)s. We propose a n...
Orhan Dagdeviren, Kayhan Erciyes, Deniz Cokuslu