Sciweavers

227 search results - page 36 / 46
» Attack Analysis and Detection for Ad Hoc Routing Protocols
Sort
View
RAID
2010
Springer
14 years 10 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
MOBICOM
2005
ACM
15 years 5 months ago
Abiding geocast: time--stable geocast for ad hoc networks
Abiding geocast is a time stable geocast delivered to all nodes that are inside a destination region within a certain period of time. Services like position–based advertising, p...
Christian Maihöfer, Tim Leinmüller, Elma...
GLOBECOM
2007
IEEE
15 years 6 months ago
The Impacts of Radio Channels and Node Mobility on Link Statistics in Mobile Ad Hoc Networks
Abstract— Understanding link statistics in mobile ad hoc networks (MANETs) is essential to design adaptive routing protocols and achieve desired network performance. While much a...
Ming Zhao 0001, Wenye Wang
TMC
2008
125views more  TMC 2008»
14 years 11 months ago
Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks
A k-hop dominating set is a subset of nodes such that each node not in the set can be reached within k hops from at least one node in the set. A connected k-hop dominating set can ...
Hong-Yen Yang, Chia-Hung Lin, Ming-Jer Tsai
MOBIHOC
2003
ACM
15 years 11 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong