Sciweavers

605 search results - page 66 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
SASN
2006
ACM
14 years 2 months ago
Robust cooperative trust establishment for MANETs
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...
TIFS
2010
130views more  TIFS 2010»
13 years 3 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
PERCOM
2007
ACM
14 years 8 months ago
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment
? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
MOBIHOC
2005
ACM
14 years 8 months ago
Scalable location services for hierarchically organized mobile ad hoc networks
This paper proposes a location service to assist location-based routing protocols, realized through a novel Associativity-Based clustering protocol. The main goal of our scheme, w...
Siva Sivavakeesar, George Pavlou
KIVS
2005
Springer
14 years 2 months ago
Improving the Usable Capacity of Ad Hoc Networks
Recent research has shown that multi-hop ad hoc networks suffer from a low capacity and moreover that an individual node’s capacity for long-distance communication decreases the...
Christian Maihöfer, Tim Leinmüller, Rein...