Sciweavers

738 search results - page 98 / 148
» Security considerations in ad hoc sensor networks
Sort
View
IWCMC
2006
ACM
14 years 2 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
ICDCS
2008
IEEE
14 years 3 months ago
Distributed Connected Dominating Set Construction in Geometric k-Disk Graphs
In this paper, we study the problem of minimum connected dominating set in geometric k-disk graphs. This research is motivated by the problem of virtual backbone construction in w...
Kai Xing, Wei Cheng, E. K. Park, Shmuel Rotenstrei...
CN
2002
87views more  CN 2002»
13 years 8 months ago
Resource management in energy-limited, bandwidth-limited, transceiver-limited wireless networks for session-based multicasting
In this paper we consider source-initiated multicast session traffic in an ad hoc wireless network, operating under hard constraints on the available transmission energy as well a...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...
INFOCOM
2007
IEEE
14 years 3 months ago
Connectivity-Aware Routing (CAR) in Vehicular Ad-hoc Networks
— Vehicular ad hoc networks using WLAN technology have recently received considerable attention. We present a position-based routing scheme called Connectivity-Aware Routing (CAR...
Valery Naumov, Thomas R. Gross
SUTC
2010
IEEE
14 years 20 days ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...