Sciweavers

1373 search results - page 128 / 275
» Self-securing ad hoc wireless networks
Sort
View
PADS
2004
ACM
14 years 1 months ago
Detailed OFDM Modeling in Network Simulation of Mobile Ad Hoc Networks
In mobile ad hoc network (MANET) studies, it is imperative to use highly detailed device models as they provide high layer protocols with good prediction of underlying wireless co...
Gavin Yeung, Mineo Takai, Rajive Bagrodia, Alireza...
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 2 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
ADHOCNOW
2003
Springer
14 years 1 months ago
Cartesian Ad Hoc Routing Protocols
The growing popularity of ad hoc networks is making their limitations, such as bandwidth and power restrictions, more apparent. As a result, techniques that reduce power consumpti...
Larry Hughes, Kafil Shumon, Ying Zhang
ISCC
2009
IEEE
147views Communications» more  ISCC 2009»
14 years 2 months ago
P2P cache-and-forward mechanisms for mobile ad hoc networks
We investigate the problem of spreading information contents in a wireless ad hoc network. In our vision, information dissemination should satisfy the following requirements: (i) ...
Claudio Casetti, Carla-Fabiana Chiasserini, Marco ...
GLOBECOM
2010
IEEE
13 years 5 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate