Sciweavers

1373 search results - page 73 / 275
» Self-securing ad hoc wireless networks
Sort
View
AINA
2006
IEEE
13 years 11 months ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel
WISEC
2010
ACM
14 years 2 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
MOBIHOC
2008
ACM
14 years 7 months ago
An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks
Broadcast scheduling is a fundamental problem in wireless ad hoc networks. The objective of a broadcast schedule is to deliver a message from a given source to all other nodes in ...
Reza Mahjourian, Feng Chen, Ravi Tiwari, My T. Tha...
SENSYS
2003
ACM
14 years 28 days ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
NETWORKING
2010
13 years 9 months ago
Fault-Tolerant Power-Aware Topology Control for Ad-Hoc Wireless Networks
Minimizing energy consumption and ensuring fault tolerance are two important issues in ad-hoc wireless networks. In this paper, we describe a distributed topology control algorithm...
Harichandan Roy, Shuvo Kumar De, Md. Maniruzzaman,...