Sciweavers

651 search results - page 53 / 131
» Cartesian Ad Hoc Routing Protocols
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
IWCMC
2006
ACM
15 years 3 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
15 years 3 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman
ICDCSW
2007
IEEE
15 years 1 months ago
Predictive Directional Greedy Routing in Vehicular Ad hoc Networks
VANETs (Vehicle Ad hoc NETworks) are highly mobile wireless ad hoc networks targeted to support vehicular safety and other commercial applications. Conventional routing protocols ...
Jiayu Gong, Cheng-Zhong Xu, James Holle
ICCS
2005
Springer
15 years 3 months ago
PATM: Priority-Based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks
Abstract. We propose a distributed and adaptive topology management algorithm, called PATM (Priority-based Adaptive Topology Management), that constructs and maintains a connected ...
Haixia Tan, Weilin Zeng, Lichun Bao