Sciweavers

395 search results - page 10 / 79
» Survivability Analysis of Ad Hoc Wireless Network Architectu...
Sort
View
ICOIN
2005
Springer
14 years 6 days ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
WORDS
2005
IEEE
14 years 8 days ago
Delay Analysis for Statistical Real-Time Channels in Mobile Ad-Hoc Networks
Wireless devices that communicate using the IEEE 802.11 protocol can be used to create mobile ad-hoc networks (MANETs). Many interesting applications using MANETs are realizable i...
Min-Gu Lee, Sunggu Lee
INFOCOM
2010
IEEE
13 years 5 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
INFOCOM
2000
IEEE
13 years 11 months ago
A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols
Abstract—In this paper we investigate the performance of multicast routing protocols in wireless mobile ad hoc networks. An ad hoc network is composed of mobile nodes without the...
Sung-Ju Lee, William Su, Julian Hsu, Mario Gerla, ...
ADHOC
2008
146views more  ADHOC 2008»
13 years 6 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi