Sciweavers

278 search results - page 20 / 56
» Performance of a Jini-based Ad Hoc Network Authentication Sc...
Sort
View
GLOBECOM
2009
IEEE
13 years 11 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 29 days ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
ENTCS
2006
173views more  ENTCS 2006»
13 years 7 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
JSAC
2007
102views more  JSAC 2007»
13 years 7 months ago
A Robust Coded MIMO FH-CDMA Transceiver for Mobile Ad Hoc Networks
Abstract— In this paper, we develop a coded MIMO FHCDMA transceiver that is robust to partial-band jamming and the near-far problem for ad hoc networks with high mobility. Spatia...
Haichang Sui, James R. Zeidler
PEWASUN
2005
ACM
14 years 28 days ago
Efficient deafness avoidance in wireless ad hoc and sensor networks with directional antennas
Using directional antennas in wireless ad hoc networks can significantly improve network performance. However, the deafness problem greatly limits the network performance. This pa...
Yihu Li, Ahmed M. Safwat