—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
Wireless Mesh Networks (WMNs) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we d...
Ronghui Hou, King-Shan Lui, Hon Sun Chiu, Kwan L. ...
In previous work, we thoroughly studied the intricate problem of energy conservation in wireless ad hoc networks. Consequently, we proposed a novel framework, namely Quasi-Guarante...
Ahmed M. Safwat, Hossam S. Hassanein, Hussein T. M...
Abstract—Position-based routing protocols use location information to refine the traditional packet flooding method in mobile ad hoc networks. They mainly focus on densely and ...
Abstract— In this paper, we propose a new cooperative communication protocol, which achieves high bandwidth efficiency while guaranteeing full diversity order. The proposed sche...
Ahmed S. Ibrahim, Ahmed K. Sadek, Weifeng Su, K. J...