A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Pilot: probabilistic lightweight group communication system for ad hoc networks
2004
IEEE Transactions on Mobile Computing
Inspired by the principles of gossip mechanisms and probabilistic quorum systems, we present in this paper PILOT (ProbabilistIc Lightweight grOup communication sysTem) for ad hoc networks, a two-layer ...
system consisting of a set of protocols for reliable multicasting and data sharing in mobile ad hoc networks. ...
The work presented in this paper was supported (in part) by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National ...
doi:10.1109/tmc.2004.12
fatcat:wxqisjvekfehxpz7riudeqqlz4
Security and resilience for smart devices and applications
2014
EURASIP Journal on Wireless Communications and Networking
Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. ...
There are many open questions for these challenging issues such as security of protocols and applications, secure architecture, frameworks and methodologies for next generation wireless networks and respective ...
However, special thanks go to Professor Luc Vandendorpe, Editor-in-Chief, for approving and making this issue possible and to the staff of EURASIP Journal on Wireless Communications and Networks for their ...
doi:10.1186/1687-1499-2014-123
fatcat:ljmyjdcaezf7ngavdybaz3ftbm
NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography
2007
2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007
communication infrastructure (such as wired networks, cellular networks, etc.), and mobile certification authorities (MCA) which are on the ad-hoc portion of the network. ...
The proliferation of network technologies (wired, cellular, ad-hoc, etc.) leads to many different network architectures. ...
Also, authors are grateful to Stephen Marsh for his help in reviewing the final draft. ...
doi:10.1109/seccom.2007.4550299
dblp:conf/securecomm/OmarCB07
fatcat:tegxwsc5qfdvpcwexxfcst2qey
Anonymous Identification for Ad Hoc Group
2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16
An anonymous identification scheme for ad hoc group allows a participant to identify himself as a member of a group of users in a way that his actual identity is not revealed. ...
Consequently, our scheme outperforms all existing constructions for a reasonably large ad hoc group size (of around 50000 users) since no exponentiation nor pairing operation is involved. ...
A lightweight ring signature scheme for anonymous identification in ad hoc group was introduced by Yang et al. [37] . ...
doi:10.1145/2897845.2897903
dblp:conf/ccs/LuA16
fatcat:yivesmaa75hehacahfqinaqvua
LHAP: A lightweight network access control protocol for ad hoc networks
2006
Ad hoc networks
We propose LHAP, a hop-by-hop authentication protocol for ad hoc networks. ...
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal ...
Moreover, many applications for ad hoc networks are group-oriented and involve collaborative computing; thus multicast communication is likely to increase in importance as multicast routing protocols for ...
doi:10.1016/j.adhoc.2005.06.002
fatcat:sgtkeh6ljvblhoenc7f55n3el4
A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones
2022
Drones
In this paper, up-to-date research studies on authentication mechanisms for IoD networks are presented. ...
sensors, computation resources, and communication units. ...
model Informal analysis Low power consumption and execution efficiency Flying Ad Hoc Random Oracle Low storage, computation Jan et al., 2021 [30] Hash functions Network DY model Model (ROM) and and communication ...
doi:10.3390/drones6020041
fatcat:ye34o3pjjjhovbe7ob3ch4mswa
Artificial Intelligence Enabled Wireless Networking for 5G and Beyond: Recent Advances and Future Challenges
[article]
2020
arXiv
pre-print
This article studies how AI and ML can be leveraged for the design and operation of B5G networks. ...
The fifth generation (5G) wireless communication networks are currently being deployed, and beyond 5G (B5G) networks are expected to be developed over the next decade. ...
Such a network needs to be deployed in an ad hoc manner and cannot rely on models that do not even exist for the specific case of interest. ...
arXiv:2001.08159v1
fatcat:r4dx7v72e5devg3f5e5kchvnpq
2019 Index IEEE Wireless Communications Letters Vol. 8
2019
IEEE Wireless Communications Letters
Isaac, R.S., +, LWC April 2019 456-459 Latency Reduction in Probabilistic Broadcast Protocols for Ad Hoc Networks. ...
., +, LWC Oct. 2019
1460-1463
Ad hoc networks
Approximation Theory for Connectivity of Ad Hoc Wireless Networks With
Node Faults. ...
doi:10.1109/lwc.2019.2961756
fatcat:bwxehcl4ejew7a6m66prb6s4z4
A Review of AI-enabled Routing Protocols for UAV Networks: Trends, Challenges, and Future Outlook
[article]
2021
arXiv
pre-print
To this end, we justify the importance and adaptation of AI into UAV network communications. ...
An important challenge is developing efficient sensing, communication, and control algorithms that can accommodate the requirements of highly dynamic UAV networks with heterogeneous mobility levels. ...
UAV-assisted networks [37] Routing protocols for UAV-aided vehicular ad hoc networks with open research issues and challenges. ...
arXiv:2104.01283v2
fatcat:p2vgtckponfm5flwz4dscf7dju
Mobile databases
2004
SIGMOD record
For example, the vision of the future dataspace paints a physical space enhanced with digital information made available through large-scale ad-hoc sensor networks [ImN02] . ...
PicoDBMS is based on a compact and efficient ad-hoc storage and indexing model. ...
doi:10.1145/1024694.1024708
fatcat:hlc4utswi5f6dkbgdbo4mumk3q
Security Issues in Automatic Dependent Surveillance -Broadcast (ADS-B): A Survey
2020
IEEE Access
Secure Broadcast Authentication In the related art, for example, wireless sensor networks and mobile ad hoc networks, broadcast authentication protocols play an important role in protecting data security ...
Since there is no double-sided communication and trustworthy transmission between ADS-B network participants, compared with the peer-to-peer communications, ADS-B message network identity verification ...
doi:10.1109/access.2020.3007182
fatcat:yx4f5hxthzes5f2gre2dnbbmri
A Secured Framework for SDN-based Edge Computing in IoT-enabled Healthcare System
2020
IEEE Access
He has served as the guest editor of IEEE Access Journal, Springer Multimedia Technology and Applications, Springer Mobile Networks and Applications, Inderscience Big data Analytics, and Ad Hoc & Sensor ...
He is the Pioneer in building (pilot) remote healthcare monitoring application (rHMA) for pregnant women for the New South Wales Healthcare Department. ...
doi:10.1109/access.2020.3011503
fatcat:ew6vrc4q65hfboqgxjqm4umium
Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes
2008
Proceedings of the IEEE
control, and airborne ad hoc networks. ...
With advanced avionics, processing and wireless communication capabilities, the e-enabled airplane can revolutionize the current air transportation system. ...
Lintelman and Chuck Royalty from The Boeing Company, and David von Oheimb from Siemens Corporation for collaborating on the electronic distribution of loadable software. ...
doi:10.1109/jproc.2008.2006123
fatcat:dt4gkqm3z5h7tb7bttmucvqc4e
Communication Network Simulation for Smart Metering Applications: A Review
2021
Journal of innovative science and engineering
In [5] , three types of simulators in a smart grid environment were considered: power system, communication network, and co-simulators for simultaneous simulations of both communication and power networks ...
The work by [6] focuses on smart grids and the required communication systems applicable for smart grid operations. ...
An enhanced routing protocol such as the routing protocol for low-power and lossy networks (RPLL), the lightweight on-demand Ad hoc distance-vector routing (LOADng), Ad-hoc on-demand distance vector (AODV ...
doi:10.38088/jise.835725
fatcat:sounwoiabzgijo4e2dqesguug4
Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem
2022
Cluster Computing
We have also provided numerical validations in context of complexity, communication overheads and computation costs. ...
We propose a lightweight consensus mechanism based on the stochastic selection followed by a transaction signing process to ensure that each drone is in control of its block. ...
The communication between the ground stations and drones can be direct or through an ad-hoc network. ...
doi:10.1007/s10586-021-03497-9
fatcat:loascmnilresjdgbe6rcswkbg4
« Previous
Showing results 1 — 15 out of 476 results