Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
We introduce the Consensual N-Player Prisoner’s Dilemma as a large-scale dilemma. We then present a framework for cooperative consensus formation in large-scale MAS under the N-P...
— In this paper, we propose a novel asynchronous Media Access Control (MAC) protocol, Opportunistic MAC (OMAC), for Multiple Input Multiple Output (MIMO) ad-hoc networks. The pro...
Abhijeet Bhorkar, B. S. Manoj, Bhaskar D. Rao, Ram...
— We present an approach to multicasting messages among highly mobile hosts in ad hoc networks. We suggest a new definition of a role-based multicast that suits the special need...
— We study the throughput capacity of hybrid wireless networks. A hybrid network is formed by placing a sparse network of base stations in an ad hoc network. These base stations ...