Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 10 of 10.

Add to Quick Collection   All 10 Results

  • First
  • Previous
  • 1
  • Next
  • Last
Sort:
 Add All Items to Quick Collection
Date: 2013
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/262853
Description: In ad hoc networks, each node is required to forward packets for others. However, based on energy consumption considerations, a node may reject other nodes' forwarding requests to save the limited bat ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/165949
Description: Based on energy consumption considerations, an ad hoc network node may reject other nodes' forwarding requests to save the limited battery power for its own data transmission. Therefore, a lot of ince ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/118932
Description: Mobile ad hoc networks (MANETs) are self-organizing and adaptive, and securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/25989
Description: For nodes of mobile ad hoc networks, energy is a scarce resource that can be quickly depleted by communications. Moreover, due to the nature of wireless communication medium, nodes can waste a substan ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/26006
Description: Mobile ad hoc network (MANET) protocols are efficient in routing data dynamically between mobile nodes that belong to the same connected component and thus assume that the network is always fully conn ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/25903
Description: Security is paramount in mobile ad-hoc networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed for MANET in the areas of key management, sec ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/24030
Description: Recently several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. In these models, recommendations are circulated by forwarding explicit messages or in ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/26016
Description: In recent years, several secure routing protocols have been proposed to secure communications among nodes in mobile ad hoc networks. However, they are not tailored to defend against denial of service ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/17558
Description: A simple, yet popular way to design energy-efficient routing for Mobile Ad Hoc Networks (MANET) is to use a virtual backbone that forms a minimum sized Connected Dominating Set (CDS) of the network to ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/18323
Description: Ad-hoc routing protocols are challenging to design and the need for security services further complicates the situation. So far the proposals for routing in ad-hoc networks offer no security mechanism ... More
Full Text: Full Text
Reviewed: Reviewed
  • First
  • Previous
  • 1
  • Next
  • Last