Sciweavers

31 search results - page 2 / 7
» Emulating End-to-End Losses and Delays for Ad Hoc Networks
Sort
View
JSAC
2006
136views more  JSAC 2006»
13 years 5 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 7 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
GLOBECOM
2007
IEEE
13 years 11 months ago
Two-Hop Two-Path Voice Communications Over a Mobile Ad-Hoc Network
Abstract— We consider two-hop communication of a delaysensitive, memoryless Gaussian source over two independent paths in an ad-hoc network. To capture the behavior an ad-hoc net...
Jagadeesh Balam, Jerry D. Gibson
ICMCS
2005
IEEE
131views Multimedia» more  ICMCS 2005»
13 years 11 months ago
A Distributed Algorithm for Congestion-Minimized Multi-Path Routing Over Ad-Hoc Networks
When an ad hoc network with limited link capacities is used to transport high-rate, latency-constrained multimedia streams, it is important that routing algorithms not only yield ...
Xiaoqing Zhu, Bernd Girod
ICOIN
2001
Springer
13 years 9 months ago
An Intelligent On-Demand Multicast Routing Protocol in Ad Hoc Networks
In thispaper; we present an intelligent on-demandmulticast routing protocol (IOD-MRP)which is suited in rapidly changing network environments, such as ad hoc networks. This protoc...
Kuochen Wang, Chaou-Tang Chang