2010
DOI: 10.1007/978-3-642-11631-5_40
|View full text |Cite
|
Sign up to set email alerts
|

Group Monitoring in Mobile Ad-Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…To keep track of each other's presence, the bracelet of each group member regularly broadcasts presence information. To protect privacy -in particular, to prevent a maliciously-intended traffic analysis from tracking a lost or isolated child -the presence information is encrypted and flooded throughout the network, such that it can be recognized only by the members of the same group [1]. Allowing all nodes to insert new information at regular time intervals while successfully disseminating the information across the entire network requires efficiently accommodating the resulting high volumes of traffic within the available bandwidth budget.…”
Section: Introductionmentioning
confidence: 99%
“…To keep track of each other's presence, the bracelet of each group member regularly broadcasts presence information. To protect privacy -in particular, to prevent a maliciously-intended traffic analysis from tracking a lost or isolated child -the presence information is encrypted and flooded throughout the network, such that it can be recognized only by the members of the same group [1]. Allowing all nodes to insert new information at regular time intervals while successfully disseminating the information across the entire network requires efficiently accommodating the resulting high volumes of traffic within the available bandwidth budget.…”
Section: Introductionmentioning
confidence: 99%
“…To keep track of each others presence, each group member regularly broadcasts presence information. To prevent maliciously intended traffic analysis for tracking of a lost or isolated member, presence information is encrypted and flooded through the network to be recognized only by members of the same group [2].…”
Section: Introductionmentioning
confidence: 99%