Sciweavers

566 search results - page 32 / 114
» Trust Establishment in Ad Hoc and Sensor Networks
Sort
View
WIOPT
2005
IEEE
14 years 1 months ago
Interference Power Sum with Log-Normal Components in Ad-Hoc and Sensor Networks
The log-normal shadowing radio model has frequently been used to model radio propagation conditions. There exist accurate calculation methods for estimation of interference power ...
Ramin Hekmat, Piet Van Mieghem
PERVASIVE
2004
Springer
14 years 29 days ago
A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
IANDC
2008
84views more  IANDC 2008»
13 years 6 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
EWSN
2004
Springer
14 years 7 months ago
A Novel Mechanism for Routing in Highly Mobile ad hoc Sensor Networks
This paper describes a novel routing mechanism for a network of highly mobile sensor nodes that routes data over dynamically changing topologies, using only information from neares...
Jane Tateson, Ian W. Marshall
ICDCSW
2009
IEEE
14 years 2 months ago
An Adapting Random Walk for Ad Hoc and Sensor Networks
Adnan Noor Mian, Roberto Baldoni, Roberto Beraldi