Sciweavers

605 search results - page 103 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
ICPPW
2002
IEEE
14 years 13 days ago
ARA - The Ant-Colony Based Routing Algorithm for MANETs
A mobile ad-hoc network (MANET) is a collection of mobile nodes which communicate over radio. These kind of networks are very flexible, thus they do not require any existing infr...
Mesut Günes, Udo Sorges, Imed Bouazizi
ADHOC
2005
176views more  ADHOC 2005»
13 years 7 months ago
A survey of Mobile IP in cellular and Mobile Ad-Hoc Network environments
The Internet has become ubiquitous and there has been tremendous growth in wireless communications in recent years. Many wireless communication techniques are commercially availab...
Tin Yu Wu, Ching-Yang Huang, Han-Chieh Chao
MOBIHOC
2007
ACM
14 years 7 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
GLOBECOM
2006
IEEE
14 years 1 months ago
On the Performance of Access Strategies for MIMO Ad Hoc Networks
— In this paper, we address the impact of different access strategies in ad hoc networks with multiple antennas and MIMO communications. We employ a cross–layer designed MAC pr...
Marco Levorato, Paolo Casari, Michele Zorzi
JSAC
2011
142views more  JSAC 2011»
13 years 2 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song