Sciweavers

1373 search results - page 93 / 275
» Self-securing ad hoc wireless networks
Sort
View
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
13 years 11 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
SECON
2007
IEEE
14 years 2 months ago
CODE: Cooperative Medium Access for Multirate Wireless Ad Hoc Network
— Cooperative communications can help combat fading and hence can significantly increase the capacity of wireless networks. Although various schemes have been proposed to levera...
Kefeng Tan, Zhiwen Wan, Hao Zhu, Jean Andrian
DIALM
2003
ACM
175views Algorithms» more  DIALM 2003»
14 years 1 months ago
Localized construction of bounded degree and planar spanner for wireless ad hoc networks
We propose a novel localized algorithm that constructs a bounded degree and planar spanner for wireless ad hoc networks modeled by unit disk graph (UDG). Every node only has to kn...
Yu Wang 0003, Xiang-Yang Li
ICPPW
1999
IEEE
14 years 1 days ago
An On-Demand Shared Tree with Hybrid State for Multicast Routing in Ad Hoc Mobile Wireless Networks
This paper describes the Multicast Shared Tree Protocol MSTP that has been designed to support the delivery of multicast packets in a mobile ad hoc network. MSTP uses a shared tre...
Elena Pagani, Gian Paolo Rossi
ICWN
2003
13 years 9 months ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...