Sciweavers

371 search results - page 34 / 75
» Secure Dynamic Source Routing
Sort
View
INFOCOM
2002
IEEE
14 years 1 months ago
A Proxy Based Indirect Routing Scheme for Ad Hoc Wireless Networks
—The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly ...
Wook Choi, Sajal K. Das
JSAC
2006
167views more  JSAC 2006»
13 years 8 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
ICNP
1998
IEEE
14 years 27 days ago
Receiver-based Multicast Scoping: A New Cost-Conscious Join/Leave Paradigm
In Internet multicast, the set of receivers can be dynamic with receivers joining and leaving a group asynchronously and without the knowledge of the sources. The Internet today u...
George F. Riley, Mostafa H. Ammar, Lenitra M. Clay
ICNP
2006
IEEE
14 years 2 months ago
Orthogonal Rendezvous Routing Protocol for Wireless Mesh Networks
— Routing in multi-hop wireless networks involves the indirection from a persistent name (or ID) to a locator. Concepts such as coordinate space embedding help reduce the number ...
Bow-Nan Cheng, Murat Yuksel, Shivkumar Kalyanarama...
CORR
2008
Springer
90views Education» more  CORR 2008»
13 years 8 months ago
Dynamic Connectivity in ALOHA Ad Hoc Networks
We consider an ad hoc network which uses multihop routing and slotted ALOHA for its MAC contention. We show that the minimum time required for a packet to reach the destination fr...
Radha Krishna Ganti, Martin Haenggi