Sciweavers

1373 search results - page 160 / 275
» Self-securing ad hoc wireless networks
Sort
View
ISPAN
2002
IEEE
14 years 3 months ago
On Locality of Dominating Set in Ad Hoc Networks with Switch-On/Off Operations
Routing based on a connected dominating set is a promising approach, where the search space for a route is reduced to the hosts in the set. A set is dominating if all the hosts in...
Jie Wu, Fei Dai
PERCOM
2003
ACM
14 years 3 months ago
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks
We investigate the performance issues of destinationsequenced distance vector (DSDV) and ad-hoc on-demand distance vector (AODV) routing protocols for mobile ad hoc networks. Four...
Yi Lu, Weichao Wang, Yuhui Zhong, Bharat K. Bharga...
INFOCOM
2007
IEEE
14 years 4 months ago
Scalability of Routing Tables in Wireless Networks
— Consider a large wireless ad hoc network that facilitates communication between random pairs of network nodes. The paper investigates the size of routing tables as the number o...
Petar Momcilovic
WCNC
2008
IEEE
14 years 4 months ago
Physical Carrier Sensing Outage in Single Hop IEEE 802.11 Ad Hoc Networks with Slowly Moving Stations
—Physical Carrier Sensing plays a crucial role in the effectiveness of CSMA-based MAC protocols, yet its properties and impact on the system performance under slow fading channel...
Jin Sheng, Kenneth S. Vastola
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 4 months ago
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks
Abstract—Secure multicast has become an important component of many applications in wireless networks. In this paper, we investigate secure intra and inter group information shar...
Weichao Wang, Yu Wang 0003