Sciweavers

738 search results - page 67 / 148
» Security considerations in ad hoc sensor networks
Sort
View
NDSS
2002
IEEE
14 years 1 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
GI
2004
Springer
14 years 2 months ago
Consistent Context Management in Mobile Ad Hoc Networks
: John entered his office. John left his office. The order of these updates to a context-aware system is important to reflect the state in the real world. Context information ob...
Jörg Hähner, Christian Becker, Pedro Jos...
IPCCC
2007
IEEE
14 years 3 months ago
Rerouting Time and Queueing in Proactive Ad Hoc Networks
In a MANET network where nodes move frequently, the probability of connectivity loss between nodes might be high, and communication sessions may easily loose connectivity during t...
Vinh Pham, Erlend Larsen, Knut Øvsthus, Paa...
MSN
2005
Springer
14 years 2 months ago
A Low Overhead Ad Hoc Routing Protocol with Route Recovery
Many routing protocols have been designed for Ad Hoc networks. However, most of these kinds of protocols are not able to react fast enough to maintain routing. In the paper, we pro...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Po Tsa...
MOBIHOC
2002
ACM
14 years 8 months ago
Comparison of broadcasting techniques for mobile ad hoc networks
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering i...
Brad Williams, Tracy Camp