Sciweavers

2691 search results - page 384 / 539
» Security in Ad Hoc Networks
Sort
View
JPDC
2007
112views more  JPDC 2007»
13 years 10 months ago
Distributed algorithms for connected domination in wireless networks
We present fast distributed local control Connected Dominating Set (CDS) algorithms for wireless ad hoc networks. We present two randomized distributed algorithms, CDSColor and CD...
Rajiv Gandhi, Srinivasan Parthasarathy 0002
GLOBECOM
2010
IEEE
13 years 7 months ago
Phase Transition Diagram for Underlay Heterogeneous Cognitive Radio Networks
Abstract--Characterizing the topology and therefore fundamental limits is a must to establish effective end-to-end cognitive radio networking (CRN). However, there lacks complete u...
Weng-Chon Ao, Shin-Ming Cheng, Kwang-Cheng Chen
INFOCOM
2002
IEEE
14 years 3 months ago
Joint Scheduling and Power Control for Wireless Ad-hoc Networks
—In this paper, we introduce a cross-layer design framework to the multiple access problem in contention-based wireless ad hoc networks. The motivation for this study is twofold,...
Tamer A. ElBatt, Anthony Ephremides
SUTC
2006
IEEE
14 years 4 months ago
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance b...
Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh...
MONET
2002
142views more  MONET 2002»
13 years 10 months ago
Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...
Xianjun Geng, Yun Huang, Andrew B. Whinston