Sciweavers

1101 search results - page 97 / 221
» Ad hoc routing based on the stability of routes
Sort
View
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
15 years 3 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
MOBIHOC
2001
ACM
16 years 1 months ago
The quest for security in mobile ad hoc networks
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overv...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
INFOCOM
2008
IEEE
15 years 7 months ago
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks
—In wireless ad-hoc sensor networks, an important issue often faced in geographic greedy forwarding routing is the “local minimum phenomenon” which is caused by deployment ho...
Zhen Jiang, Junchao Ma, Wei Lou, Jie Wu
ADHOCNOW
2003
Springer
15 years 6 months ago
Cartesian Ad Hoc Routing Protocols
The growing popularity of ad hoc networks is making their limitations, such as bandwidth and power restrictions, more apparent. As a result, techniques that reduce power consumpti...
Larry Hughes, Kafil Shumon, Ying Zhang