-
1
-
-
34948881799
-
Stochastic properties of mobility models in mobile ad hoc networks
-
DOI 10.1109/TMC.2007.1014
-
Bandyopadhyay, S., Coyle, E.J., Falck, T.: Stochastic properties of mobility models in mobile ad hoc networks. IEEE Transactions on Mobile Computing 6(11), 1218-1229 (2007) (Pubitemid 47525356)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.11
, pp. 1218-1229
-
-
Bandyopadhyay, S.1
Coyle, E.J.2
Falck, T.3
-
2
-
-
36849034196
-
Topology properties of ad hoc networks with random waypoint mobility
-
Bettstetter, C.: Topology properties of ad hoc networks with random waypoint mobility. SIG-MOBILE Mob. Comput. Commun. Rev. 7(3), 50-52 (2003)
-
(2003)
SIG-MOBILE Mob. Comput. Commun. Rev.
, vol.7
, Issue.3
, pp. 50-52
-
-
Bettstetter, C.1
-
4
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc 2007 (2007)
-
(2007)
MobiHoc 2007
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
5
-
-
56749181478
-
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
-
Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. In: WiSec 2008, pp. 214-219 (2008)
-
(2008)
WiSec 2008
, pp. 214-219
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
6
-
-
34047106767
-
A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks
-
Curtmola, R., Kamara, S.: A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks. Electronic Notes in Theoretical Computer Science (ENTCS) 171(1), 57-69 (2007)
-
(2007)
Electronic Notes in Theoretical Computer Science (ENTCS)
, vol.171
, Issue.1
, pp. 57-69
-
-
Curtmola, R.1
Kamara, S.2
-
7
-
-
33845926634
-
An RSSI-based scheme for sybil attack detection in wireless sensor networks
-
Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: WOWMOM 2006 (2006)
-
(2006)
WOWMOM 2006
-
-
Demirbas, M.1
Song, Y.2
-
8
-
-
33749625947
-
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
-
Di Pietro, R., Mancini, L.V., Mei, A.: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6), 709-721 (2006)
-
(2006)
Wireless Networks
, vol.12
, Issue.6
, pp. 709-721
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
9
-
-
33847323575
-
Securing topology maintenance protocols for sensor networks: Attacks and countermeasures
-
Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing topology maintenance protocols for sensor networks: Attacks and countermeasures. In: SecureComm 2005, pp. 101-112 (2005)
-
(2005)
SecureComm 2005
, pp. 101-112
-
-
Gabrielli, A.1
Mancini, L.V.2
Setia, S.3
Jajodia, S.4
-
10
-
-
0042975095
-
Locating nodes with EASE: Last encounter routing in ad hoc networks through mobility diffusion
-
Grossglauser, M., Vetterli, M.: Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. In: INFOCOM 2003 (2003)
-
(2003)
INFOCOM 2003
-
-
Grossglauser, M.1
Vetterli, M.2
-
12
-
-
33646407130
-
Spatial node distribution of the random waypoint mobility model with applications
-
Hyytiä, E., Lassila, P., Virtamo, J.: Spatial node distribution of the random waypoint mobility model with applications. IEEE Transactions on Mobile Computing 5(6), 680-694 (2006)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.6
, pp. 680-694
-
-
Hyytiä, E.1
Lassila, P.2
Virtamo, J.3
-
14
-
-
34247555864
-
A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks
-
Liu, H., Wan, P.-J., Liu, X., Yao, F.: A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems 18(5), 658-671 (2007)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.5
, pp. 658-671
-
-
Liu, H.1
Wan, P.-J.2
Liu, X.3
Yao, F.4
-
15
-
-
25844459686
-
Joint mobility and routing for lifetime elongation in wireless sensor networks
-
Luo, J., Hubaux, J.-P.: Joint mobility and routing for lifetime elongation in wireless sensor networks. In: INFOCOM 2005 (2005)
-
(2005)
INFOCOM 2005
-
-
Luo, J.1
Hubaux, J.-P.2
-
16
-
-
70349656216
-
SWIM: A simple model to generate small mobile worlds
-
Mei, A., Stefa, J.: SWIM: A simple model to generate small mobile worlds. In: INFOCOM 2009 (2009)
-
(2009)
INFOCOM 2009
-
-
Mei, A.1
Stefa, J.2
-
17
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004 (2004)
-
(2004)
IPSN 2004
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
18
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commununica-tions of ACM 47(6), 53-57 (2004)
-
(2004)
Commununica-tions of ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
20
-
-
69849085215
-
-
January
-
Scott, J., Gass, R., Crowcroft, J., Hui, P., Diot, C., Chaintreau, A.: Crawdad data set cambridge/haggle (v. 2006-01-31) (January 2006), http://crawdad.cs.dartmouth.edu/cambridge/haggle/imote/ infocom
-
(2006)
-
-
Scott, J.1
Gass, R.2
Crowcroft, J.3
Hui, P.4
Diot, C.5
Chaintreau, A.6
-
21
-
-
39049148855
-
Delay and capacity trade-offs in mobile ad hoc networks: A global perspective
-
Sharma, G., Mazumdar, R., Shroff, N.B.: Delay and capacity trade-offs in mobile ad hoc networks: A global perspective. In: INFOCOM 2006 (2006)
-
(2006)
INFOCOM 2006
-
-
Sharma, G.1
Mazumdar, R.2
Shroff, N.B.3
-
22
-
-
42549112648
-
A robust, distributed TGDH-based scheme for secure group communications in MANET
-
Striki, M., Baras, J., Manousakis, K.: A robust, distributed TGDH-based scheme for secure group communications in MANET. In: Proceedings of ICC 2004 (2006)
-
(2006)
Proceedings of ICC 2004
-
-
Striki, M.1
Baras, J.2
Manousakis, K.3
-
23
-
-
11044237379
-
A two-zone hybrid routing protocol for mobile ad hoc networks
-
Wang, L., Olariu, S.: A two-zone hybrid routing protocol for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 15(12), 1105-1116 (2004)
-
(2004)
IEEE Trans. Parallel Distrib. Syst.
, vol.15
, Issue.12
, pp. 1105-1116
-
-
Wang, L.1
Olariu, S.2
|