Sciweavers

775 search results - page 38 / 155
» Secure Service Provision in Ad Hoc Networks
Sort
View
FTDCS
2003
IEEE
14 years 4 months ago
Towards Middleware Services for Mobile Ad-Hoc Network Applications
Mobile ad-hoc networks are typically very dynamic networks in terms of available communication partners, available network resources, connectivity, etc. Furthermore, the end-user ...
Thomas Plagemann, Vera Goebel, Carsten Griwodz, P&...
APNOMS
2006
Springer
14 years 2 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
DSN
2004
IEEE
14 years 2 months ago
Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications
The growing interest in ad hoc wireless network applications that are made of large and dense populations of lightweight system resources calls for scalable approaches to fault to...
Ann T. Tai, Kam S. Tso, William H. Sanders
DIALM
1999
ACM
113views Algorithms» more  DIALM 1999»
14 years 3 months ago
Flooding for reliable multicast in multi-hop ad hoc networks
Ad hoc networks are gaining popularity as a result of advances in smaller, more versatile and powerful mobile computing devices. The distinguishing feature of these networks is the...
Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 4 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...