Spelling suggestions: "subject:"adhoc"" "subject:"ad'hoc""
31 |
Secure and efficient wireless ad hoc networkingKhabbazian, Majid 11 1900 (has links)
Wireless ad hoc networks have been emerged to support applications, in which it is required/desired to have wireless ommunications among a variety of devices without relying on any infrastructure or central managements. In ad hoc networks, wireless devices, simply called nodes, have limited transmission range. Therefore, each node can directly communicate with only those
within its transmission range and requires other nodes to act as routers in order
to communicate with out-of-range estinations. One of the fundamental
operations in ad hoc networks is broadcasting, where a node sends a message
to all other nodes in the network. This can be achieved through flooding, in which every node transmits the first copy of the received message. However, flooding can impose a large number of redundant transmissions, which
can result in significant waste of constrained resources such as bandwidth
and battery power. One of the contributions of this work is to propose efficient
broadcast algorithms which can significantly reduce the number of redundant transmissions. We also consider some of the security issues of ad hoc networks. In particular, we carefully analyze the effect of the wormhole
attack, which is one of the most severe threats against ad hoc networks. We also propose a countermeasure, which is an improvement over the existing timing-based solutions against the wormhole attack. Finally, in the last chapter, we propose novel point compression techniques which can be used in Elliptic Curve Cryptography (ECC). ECC can provide the same level of
security as other public key cryptosystems (such as RSA) with substantially smaller key sizes. Smaller keys can result in smaller system parameters, bandwidth savings, faster implementations and lower power consumption.
These advantages make ECC interesting for ad hoc networks with restricted devices.
|
32 |
A MAC Protocol for Multihop RP-CDMA Ad Hoc Wireless NetworksMortimer, Richard T Unknown Date
No description available.
|
33 |
Stabile Kommunikation in dynamischen Ad-hoc-NetzenGerharz, Michael January 2006 (has links)
Zugl.: Bonn, Univ., Diss., 2006
|
34 |
Evaluierung von partitionierungsbewußten MANET Protokollen mit ns-2Dietrich, Rüdiger Oliver. January 2005 (has links)
Stuttgart, Univ., Studienarbeit, 2005.
|
35 |
Routing protocols for mobile ad hoc networks classification, evaluation and challengesLang, Daniel January 2006 (has links)
Zugl.: München, Techn. Univ., Diss., 2006 u.d.T.: Lang, Daniel: On the evaluation and classification of routing protocols for mobile ad hoc networks / Hergestellt on demand
|
36 |
Insiderrecht und Ad-hoc-Publizität nach dem AnlegerschutzverbesserungsgesetzEichner, Moritz Peter January 2008 (has links)
Zugl.: Tübingen, Univ., Diss., 2008
|
37 |
Entwicklung eines energieeffizienten Dienstauffindungsverfahrens für mobile ad-hoc NetzwerkeLechler, Renate. January 2005 (has links)
Stuttgart, Univ., Diplomarb., 2005.
|
38 |
Region-based adaptation of diffusion protocols in MANETsKabir, Mashud. January 2003 (has links)
Stuttgart, Univ., master thesis, 2003.
|
39 |
Konzeption und Implementierung eines ortsbezogenen Ad-Hoc Routing Protokoll für die Linux PlattformKlinger, Richard. January 2003 (has links)
Stuttgart, Univ., Diplomarb., 2003.
|
40 |
Energieeffiziente Dienstnutzung in spontan vernetzten ubiquitären RechnersystemenLange, Ralph. January 2005 (has links)
Stuttgart, Univ., Studienarb., 2005.
|
Page generated in 0.0282 seconds