Sciweavers

258 search results - page 20 / 52
» Trusting Routers and Relays in Ad hoc Networks
Sort
View
CSREASAM
2008
13 years 9 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
SECPERU
2006
IEEE
14 years 1 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
INFOCOM
2007
IEEE
14 years 2 months ago
Many-to-Many Communication: A New Approach for Collaboration in MANETs
—We introduce a collaboration-driven approach to the sharing of the available bandwidth in wireless ad hoc networks, which we call many-to-many cooperation, that allows concurren...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
VTC
2006
IEEE
14 years 1 months ago
On Link Reliability in Wireless Mobile Ad Hoc Networks
— In mobile ad hoc networks (MANETs), packets are forwarded by a series of nodes to the desired destination. Previously, we have studied the network connectivity of MANETs. In th...
Juki Wirawan Tantra, Chuan Heng Foh, Dongyu Qiu
ICITA
2005
IEEE
14 years 1 months ago
A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the...
Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien...