Sciweavers

1373 search results - page 102 / 275
» Self-securing ad hoc wireless networks
Sort
View
WOWMOM
2005
ACM
119views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Exploiting Path Diversity in the Link Layer in Wireless Ad Hoc Networks
— We develop an anycast mechanism at the link layer for wireless ad hoc networks. The goal is to exploit path diversity in the link layer by choosing the best next hop to forward...
Shweta Jain, Samir R. Das
ICPP
2003
IEEE
14 years 1 months ago
On Maximizing Lifetime of Multicast Trees in Wireless Ad hoc Networks
This paper presents a distributed algorithm called LREMiT for extending the lifetime of a source-based multicast tree in wireless ad hoc networks (WANET). The lifetime of a multic...
Bin Wang, Sandeep K. S. Gupta
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 11 months ago
A Near Optimal Localized Heuristic for Voice Multicasting over Ad Hoc Wireless Networks
Abstract-- Providing real-time voice multicasting over multihop ad hoc wireless networks is a challenging task. The unique characteristics of voice traffic (viz. small packet size,...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...
GLOBECOM
2009
IEEE
13 years 11 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
ICC
2009
IEEE
157views Communications» more  ICC 2009»
14 years 2 months ago
Transmission Capacity of Wireless Ad Hoc Networks: Successive Interference Cancellation vs. Joint Detection
Abstract—The performance benefits of two interference cancellation methods, successive interference cancellation (SIC) and joint detection (JD), in wireless ad hoc networks are ...
Joseph Blomer, Nihar Jindal