Sciweavers

25 search results - page 3 / 5
» Ad Hoc On-Demand Backup Node Setup Routing Protocol
Sort
View
ADHOC
2005
134views more  ADHOC 2005»
14 years 9 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
IJWIN
2002
111views more  IJWIN 2002»
14 years 9 months ago
Internet Connectivity for Ad Hoc Mobile Networks
The growing deployment rate of wireless LANs indicates that wireless networking is rapidly becoming a prevalent form of communication. As users become more accustomed to the use o...
Yuan Sun, Elizabeth M. Belding-Royer, Charles E. P...
WONS
2005
IEEE
15 years 3 months ago
Multipath Associativity Based Routing
Abstract:This paper introduces a series of new multipath routing protocols developed upon Associativity Based Routing (ABR) for wireless ad-hoc networks. ABR selects routes based o...
Patrick McCarthy, Dan Grigoras
EURONGI
2004
Springer
15 years 1 months ago
Performance of Internet Access Solutions in Mobile Ad Hoc Networks
Abstract. Although an autonomous mobile ad hoc network (MANET) is useful in many scenarios, a MANET connected to the Internet is more desirable. This interconnection is achieved by...
Ali Hamidian, Ulf Körner, Anders Nilsson
ICWN
2004
14 years 11 months ago
Demand-Driven Clustering in MANETs
Abstract-- Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far [1], all these protocols are proactive...
Curt Cramer, Oliver Stanze, Kilian Weniger, Martin...