Sciweavers

605 search results - page 42 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
ESAS
2007
Springer
14 years 1 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini
ICPPW
2002
IEEE
14 years 16 days ago
Robust Routing in Wireless Ad Hoc Networks
A wireless ad hoc network is a collection of mobile nodes with no fixed infrastructure. The absence of central authorization facility in dynamic and distributed environment requir...
Seungjoon Lee, Bohyung Han, Minho Shin
ADHOC
2006
86views more  ADHOC 2006»
13 years 7 months ago
An implementation framework for trajectory-based routing in ad hoc networks
Routing in ad-hoc networks is a complicated task because of many reasons. The nodes are low-memory, lowpowered, and they cannot maintain routing tables large enough for well-known ...
Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaram...
ICWMC
2006
IEEE
14 years 1 months ago
An Ant-based Routing Protocol using Unidirectional Links for Heterogeneous Mobile Ad-Hoc Networks
Because of the heterogeneity in radio transceiver capabilities and influence of surroundings, unidirectional links arise in wireless mobile ad-hoc networks. Since most of existin...
Taro Maekawa, Harumasa Tada, Naoki Wakamiya, Makot...
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio