Sciweavers

566 search results - page 53 / 114
» Trust Establishment in Ad Hoc and Sensor Networks
Sort
View
ESAS
2004
Springer
13 years 11 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
GI
2004
Springer
14 years 1 months ago
Consistent Context Management in Mobile Ad Hoc Networks
: John entered his office. John left his office. The order of these updates to a context-aware system is important to reflect the state in the real world. Context information ob...
Jörg Hähner, Christian Becker, Pedro Jos...
MSN
2005
Springer
14 years 1 months ago
A Low Overhead Ad Hoc Routing Protocol with Route Recovery
Many routing protocols have been designed for Ad Hoc networks. However, most of these kinds of protocols are not able to react fast enough to maintain routing. In the paper, we pro...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Po Tsa...
INFOCOM
2002
IEEE
14 years 18 days ago
QoS routing for mobile ad hoc networks
Abstract—A Quality-of-Service (QoS) routing protocol is developed for mobile ad hoc networks. It can establish QoS routes with reserved bandwidth on a per flow basis in a networ...
Chenxi Zhu, M. Scott Corson
VTC
2006
IEEE
179views Communications» more  VTC 2006»
14 years 1 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu