Sciweavers

605 search results - page 71 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
CORR
2010
Springer
183views Education» more  CORR 2010»
13 years 8 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
MOBICOM
2006
ACM
14 years 2 months ago
On delivery guarantees of face and combined greedy-face routing in ad hoc and sensor networks
It was recently reported that all known face and combined greedy-face routing variants cannot guarantee message delivery in arbitrary undirected planar graphs. The purpose of this...
Hannes Frey, Ivan Stojmenovic
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 8 months ago
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for Dense MANETs
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join the mobile ad hoc network, contention and congestion are more likely. Th...
Sharmila Sankar, V. Sankaranarayanan
ADHOC
2007
91views more  ADHOC 2007»
13 years 9 months ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
INFOCOM
2007
IEEE
14 years 3 months ago
Transmit Power Distribution of Wireless Ad Hoc Networks with Topology Control
— Topology control and routing protocols are used by designers of wireless packet data networks to lower the node degree, simplify routing and lower the nodes’ energy consumpti...
Dan Avidor, Sayandev Mukherjee, Furuzan Atay Onat