Sciweavers

738 search results - page 66 / 148
» Security considerations in ad hoc sensor networks
Sort
View
JSAC
2006
116views more  JSAC 2006»
13 years 8 months ago
A position-based QoS routing scheme for UWB mobile ad hoc networks
Ultra-wideband (UWB) wireless communication is a promising spread-spectrum technology that supports very high data rates and provides precise position information of mobile users. ...
Atef Abdrabou, Weihua Zhuang
AINA
2007
IEEE
14 years 3 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
GLOBECOM
2006
IEEE
14 years 2 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
VTC
2006
IEEE
179views Communications» more  VTC 2006»
14 years 2 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu
IEEEARES
2006
IEEE
14 years 2 months ago
Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks
Mobile ad-hoc networks with their arbitrary topologies are a difficult domain for providing highly available Web services. Since hosts can move unpredictably, finding services a...
Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustd...