Sciweavers

1373 search results - page 86 / 275
» Self-securing ad hoc wireless networks
Sort
View
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 2 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
ICON
2007
IEEE
14 years 2 months ago
Node Localisation in Wireless Ad Hoc Networks
— Wireless ad hoc networks often require a method for estimating their nodes’ locations. Typically this is achieved by the use of pair-wise measurements between nodes and their...
Jon Arnold, Nigel Bean, Miro Kraetzl, Matthew Roug...
GLOBECOM
2006
IEEE
14 years 1 months ago
Maximizing Broadcast Tree Lifetime in Wireless Ad Hoc Networks
— In wireless ad hoc networks (WANETs), e.g. wireless sensor networks, battery-powered devices are constrained by limited amount of energy. Many WANET applications require that t...
Guofeng Deng, Sandeep K. S. Gupta
ITCC
2005
IEEE
14 years 1 months ago
Performance Analysis of Mobile Backbone Topology Synthesis Algorithm for Wireless Ad Hoc Networks
In this paper, we present a scalable fully distributed version of a Mobile Backbone Network Topology Synthesis Algorithm (MBN-TSA) for constructing and maintaining a dynamic backb...
Laura Huei-jiun Ju, Izhak Rubin
ICNP
2005
IEEE
14 years 1 months ago
The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks
In wireless networks, it is well understood what throughput can be achieved by nodes who can hear each other (i.e. nodes within a single cell)[1, 3]. The effects of nodes beyond t...
Yan Gao, Dah-Ming Chiu, John C. S. Lui