Sciweavers

1321 search results - page 123 / 265
» On the Age of Pseudonyms in Mobile Ad Hoc Networks
Sort
View
WIMOB
2008
IEEE
14 years 2 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 2 months ago
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks
Abstract—Secure multicast has become an important component of many applications in wireless networks. In this paper, we investigate secure intra and inter group information shar...
Weichao Wang, Yu Wang 0003
WONS
2005
IEEE
14 years 1 months ago
Secure Multipath Routing for Mobile Ad Hoc Networks
Multipath routing minimizes the consequences of security attacks deriving from collaborating malicious nodes in MANET, by maximizing the number of nodes that an adversary must com...
Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos...
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
14 years 1 months ago
Reliable Gossip-Based Broadcast Protocol in Mobile Ad Hoc Networks
Based on existing reliable broadcast protocols in MANETs, we propose a novel reliable broadcast protocol that uses clustering technique and gossip methodology. We combine local ret...
Guojun Wang, Dingzhu Lu, Weijia Jia, Jiannong Cao
GLOBECOM
2009
IEEE
14 years 2 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak