Sciweavers

44 search results - page 5 / 9
» Resisting Malicious Packet Dropping in Wireless Ad Hoc Netwo...
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
BROADNETS
2004
IEEE
13 years 11 months ago
The Case for Multipath Multimedia Transport over Wireless Ad Hoc Networks
Real-time multimedia transport has stringent bandwidth, delay, and loss requirements. Supporting this application in current wireless ad hoc networks is a challenge. Such networks...
Yihan Li, Shiwen Mao, Shivendra S. Panwar
ISCC
2003
IEEE
113views Communications» more  ISCC 2003»
14 years 26 days ago
CSMA/IC: A New Class of Collision-free MAC Protocols for Ad Hoc Wireless Networks
– In this paper, we present a new collision-free MAC protocol–Carrier Sense Media Access with ID Countdown (CSMA/IC) for ad hoc wireless networks that can achieve 100% collisio...
Tiantong You, Chi-Hsiang Yeh, Hossam S. Hassanein
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han
WOWMOM
2005
ACM
119views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Exploiting Path Diversity in the Link Layer in Wireless Ad Hoc Networks
— We develop an anycast mechanism at the link layer for wireless ad hoc networks. The goal is to exploit path diversity in the link layer by choosing the best next hop to forward...
Shweta Jain, Samir R. Das