Sciweavers

1373 search results - page 164 / 275
» Self-securing ad hoc wireless networks
Sort
View
MOBISYS
2005
ACM
14 years 9 months ago
Design and implementation of a single system image operating system for ad hoc networks
In this paper, we describe the design and implementation of a distributed operating system for ad hoc networks. Our system simplifies the programming of ad hoc networks and extend...
Hongzhou Liu, Tom Roeder, Kevin Walsh, Rimon Barr,...
MOBIHOC
2002
ACM
14 years 9 months ago
Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks
We present a series of approximation algorithms for finding a small weakly-connected dominating set (WCDS) in a given graph to be used in clustering mobile ad hoc networks. The st...
Yuanzhu Peter Chen, Arthur L. Liestman
AINA
2008
IEEE
14 years 4 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
MSWIM
2006
ACM
14 years 4 months ago
The effect of the radio wave propagation model in mobile ad hoc networks
The simulation of wireless networks has been an important tool for researchers and the industry in the last years. Especially in the field of Mobile Ad Hoc Networking, most curre...
Arne Schmitz, Martin Wenig
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 11 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...