Sciweavers

1455 search results - page 140 / 291
» Policy-Based Mobile Ad Hoc Network Management
Sort
View
ICOIN
2005
Springer
14 years 2 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 9 months ago
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network
In this paper optimization of DSR is achieved using New Link Cache structure and Source Transparent Route Maintenance Method. The new link cache effectively utilizes the memory by ...
Chinnappan Jayakumar, Chenniappan Chellappan
AINA
2004
IEEE
14 years 1 months ago
An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET)
A secure MANET system, called SMANET, was developed that accepts only those packets whose MAC addresses are in the Linux iptable firewall rules. Detailed iptable set up and the pe...
C. Edward Chow, Paul J. Fong, Ganesh Godavari
ADHOCNOW
2006
Springer
14 years 3 months ago
Circularity-Based Medium Access Control in Mobile Ad Hoc Networks
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...
PERCOM
2005
ACM
14 years 8 months ago
A Dynamic Lightweight Platform for Ad-Hoc Infrastructures
Mobile devices like PDAs or mobile phones have become widespread. Similarly, network functionality like GSM, Bluetooth, or WLAN has become standard. Nevertheless, not many applica...
Andreas Frei, Gustavo Alonso