Sciweavers

662 search results - page 63 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
CISS
2008
IEEE
14 years 3 months ago
End-to-end bandwidth and available bandwidth estimation in multi-hop IEEE 802.11b ad hoc networks
—In this paper we estimate the end-to-end total bandwidth (BW) and available bandwidth (ABW) of a path between a pair of nodes in an IEEE 802.11b ad hoc network, both as function...
Marco A. Alzate, Jose-Carlos Pagan, Néstor ...
IPPS
2006
IEEE
14 years 2 months ago
k-anycast routing schemes for mobile ad hoc networks
— Anycast is a communication paradigm that was first introduced to the suit of routing protocols in IPv6 networks. In anycast, a packet is intended to be delivered to one of the...
Bing Wu, Jie Wu
ANSS
2004
IEEE
14 years 17 days ago
A Spatial Analysis of Mobility Models: Application to Wireless Ad Hoc Network Simulation
We quantatively analyze the differences between a realistic mobility model, TRANSIMS, and several synthetic mobility models. New synthetic models were created by modifying the sta...
D. Charles Engelhart, Anand Sivasubramaniam, Chris...
CCS
2010
ACM
13 years 6 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...
WOWMOM
2006
ACM
84views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Measurements from an 802.11b Mobile Ad Hoc Network
This paper analyzes the characteristics of a multi-hop 802.11b mobile ad hoc network. We present data gathered from a mobile network of 20 devices carried by test users over 5 day...
Vincent Lenders, Jorg Wagner, Martin May