Sciweavers

995 search results - page 27 / 199
» Gossip-based ad hoc routing
Sort
View
69
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
A Brownian Motion Model for Last Encounter Routing
— We use a mathematical model based on Brownian motion to analyze the performance of Last Encounter Routing (LER), a routing protocol for ad hoc networks. Our results show that, ...
Stratis Ioannidis, Peter Marbach
94
Voted
ICDCSW
2005
IEEE
15 years 3 months ago
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc net...
Zhou Zhi, Yow Kin Choong
SASN
2003
ACM
15 years 2 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
JCM
2008
121views more  JCM 2008»
14 years 9 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang
99
Voted
ICN
2007
Springer
15 years 3 months ago
Design Issues of Peer-to-Peer Systems for Wireless Ad Hoc Networks
– Peer-to-peer is a popular distributed system. Mobile ad hoc networks and peer-to-peer file sharing systems both lack fixed infrastructure support and hold no a-priori knowledge...
Dewan Tanvir Ahmed, Shervin Shirmohammadi