Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
We quantatively analyze the differences between a realistic mobility model, TRANSIMS, and several synthetic mobility models. New synthetic models were created by modifying the sta...
D. Charles Engelhart, Anand Sivasubramaniam, Chris...
Abstract--We introduce multi-hop aggregate information efficiency (MIEA), a comprehensive metric that captures several performance-affecting factors of wireless ad hoc networks in ...
Pedro Henrique Juliano Nardelli, Giuseppe Thadeu F...
—The paper analyzes the relationships among the transmission range, carrier sensing range, and interference range in case that power control is adopted and proposes an adaptive r...