Sciweavers

662 search results - page 73 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation
Abstract— In this paper we use an information-theoretic formulation for characterizing the minimum routing overhead of link state routing in a mobile ad hoc network. We formulate...
Di Wang, Alhussein A. Abouzeid
ICC
2007
IEEE
163views Communications» more  ICC 2007»
14 years 3 months ago
An Auction based AODV Protocol for Mobile Ad Hoc Networks with Selfish Nodes
– In this paper, we propose an auction mechanism for routing in mobile ad hoc networks with selfish nodes. Our approach is to promote bidding for end-to-end routes, as opposed to...
Cenker Demir, Cristina Comaniciu
GLOBECOM
2007
IEEE
14 years 3 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
ICCNMC
2005
Springer
14 years 2 months ago
A Prediction-Based Location Update Algorithm in Wireless Mobile Ad-Hoc Networks
Location information in Mobile Ad Hoc Networks (MANETs) provides efficiency to uni-cast and multi-cast algorithms. This paper proposes a new location update algorithm called PLU. T...
Jun Shen, Kun Yang, Shaochun Zhong
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Stable, Congestion-Controlled Application-Layer Multicasting in Pedestrian Ad-Hoc Networks
Ad-hoc networks enable mobile devices to communicate without any fixed infrastructure. While reliable multicasting has been identified as a key application in this context, we a...
Peter Baumung