Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
—Throughput capacity in wireless ad hoc networks has been studied extensively under many different mobility models such as i.i.d. mobility model, Brownian mobility model, random ...
In this paper, a reliability analysis is carried out to state a performance comparison between two recently proposed proactive routing algorithms. These protocols are able to scale...
Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paur...
Wireless networking and group communication in combination allows groups of dispersed mobile users to collaborate. This paper presents AGENT, a medium access control (MAC) protocol...
: Mobile ad hoc networks are self-organized, and devices in such networks have to locate available services dynamically. We propose to utilize anycast for efficient service discove...
Jidong Wu, Oliver Stanze, Kilian Weniger, Martina ...