Sciweavers

839 search results - page 5 / 168
» k-anycast routing schemes for mobile ad hoc networks
Sort
View
ESAS
2007
Springer
14 years 1 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
AINA
2006
IEEE
13 years 11 months ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel
JNW
2006
68views more  JNW 2006»
13 years 7 months ago
Quick Local Repair Scheme using Adaptive Promiscuous Mode in Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), there is frequently disconnected a route consisting of multi-hop from a source to a destination because of the dynamic nature such as the topolo...
Joo Sang Youn, Jihoon Lee, Doo-Hyun Sung, Chul-Hee...
CROSSROADS
2004
108views more  CROSSROADS 2004»
13 years 7 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
GLOBECOM
2006
IEEE
14 years 1 months ago
Adaptive Multi-Copy Routing for Intermittently Connected Mobile Ad Hoc Networks
— Intermittently Connected Mobile Ad Hoc Networks (ICMANs) are mobile networks in which complete source-todestination paths do not exist most of the time because of their sparse ...
Zhuoqun Li, Lingfen Sun, Emmanuel C. Ifeachor