Sciweavers

662 search results - page 17 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
ICDCSW
2003
IEEE
14 years 23 days ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
COMPSAC
2003
IEEE
14 years 24 days ago
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of ...
Stephen S. Yau, Xinyu Zhang
ADT
2008
13 years 7 months ago
Evaluating voice traffic requirements on IEEE 802.11 ad hoc networks
This paper analyzes voice transmission capacity on IEEE 802.11 ad hoc networks by performing simulations related to delay, jitter, loss rate, and consecutive losses. We evaluate th...
Pedro B. Velloso, Marcelo G. Rubinstein, Otto Carl...
ICC
2007
IEEE
178views Communications» more  ICC 2007»
14 years 1 months ago
Impact of Transmission Power on the Performance of UDP in Vehicular Ad Hoc Networks
—With the availability of cheap and robust wireless devices there is demand for new applications in Vehicular Ad-hoc Networks (VANET). The challenge in implementing applications ...
Behrooz Khorashadi, Andrew Chen, Dipak Ghosal, Che...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 1 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana