Sciweavers

1101 search results - page 86 / 221
» Ad hoc routing based on the stability of routes
Sort
View
GLOBECOM
2006
IEEE
15 years 7 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
VTC
2006
IEEE
15 years 7 months ago
On Link Reliability in Wireless Mobile Ad Hoc Networks
— In mobile ad hoc networks (MANETs), packets are forwarded by a series of nodes to the desired destination. Previously, we have studied the network connectivity of MANETs. In th...
Juki Wirawan Tantra, Chuan Heng Foh, Dongyu Qiu
BROADNETS
2006
IEEE
15 years 3 months ago
On the Broadcast Storm Problem in Ad hoc Wireless Networks
Routing protocols developed for ad hoc wireless networks use broadcast transmission to either discover a route or disseminate information. More specifically, reactive routing proto...
Ozan K. Tonguz, Nawaporn Wisitpongphan, Jayendra S...
ICDCS
2008
IEEE
15 years 7 months ago
On the Longest RNG Edge of Wireless Ad Hoc Networks
— Relative neighborhood graph (RNG) has been widely used in topology control and geographic routing in wireless ad hoc networks. Its maximum edge length is the minimum requiremen...
Peng-Jun Wan, Lixin Wang, F. Frances Yao, Chih-Wei...
HICSS
2005
IEEE
137views Biometrics» more  HICSS 2005»
15 years 7 months ago
Sliding Window Protocol for Group Communication in Ad-Hoc Networks
Existing ad hoc routing protocols are either unicast or multicast. In this paper we propose a simple extension to the Dynamic Source Routing Protocol (DSR) to cater for group comm...
In Joe Khor, Johnson P. Thomas, Istvan Jonyer