Sciweavers

1373 search results - page 53 / 275
» Self-securing ad hoc wireless networks
Sort
View
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ISCC
2002
IEEE
169views Communications» more  ISCC 2002»
14 years 16 days ago
Congestion controlled adaptive lightweight multicast in wireless mobile ad hoc networks
The use of contention-based MAC protocols combined with hidden terminal problems make multi-hop wireless ad hoc networks much more sensitive to load and congestion than wired netw...
Ken Tang, Katia Obraczka, Sung-Ju Lee, Mario Gerla
IJNSEC
2007
145views more  IJNSEC 2007»
13 years 7 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
ISCAS
2005
IEEE
199views Hardware» more  ISCAS 2005»
14 years 1 months ago
Congestion-optimized scheduling of video over wireless ad hoc networks
We analyze the benefits of information sharing between the application layer and the transport layer, for streaming video encoded at several different qualities, in a mobile wir...
Eric Setton, Xiaoqing Zhu, Bernd Girod
MOBIHOC
2007
ACM
14 years 7 months ago
Capacity of a wireless ad hoc network with infrastructure
In this paper we study the capacity of wireless ad hoc networks with infrastructure support of an overlay of wired base stations. Such a network architecture is often referred to ...
Benyuan Liu, Patrick Thiran, Donald F. Towsley