Sciweavers

5079 search results - page 180 / 1016
» Hidden-Action in Network Routing
Sort
View
CCS
2008
ACM
15 years 12 days ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...
INFOCOM
2008
IEEE
15 years 4 months ago
An Optimization Framework for Opportunistic Multipath Routing in Wireless Mesh Networks
—We consider wireless mesh networks, and exploit the inherent broadcast nature of wireless by making use of multipath routing. We present an optimization framework that enables u...
Bozidar Radunovic, Christos Gkantsidis, Peter B. K...
81
Voted
WIOPT
2005
IEEE
15 years 4 months ago
NEURAL: A Self-Organizing Routing Algorithm for Ad Hoc Networks
This paper evaluates a self-organizing routing protocol for Ad Hoc network, called the NEUron Routing ALgorithm (NEURAL). NEURAL has been designed taking into account the learning...
Vicente E. Mujica V, Dorgham Sisalem, Radu Popescu...
SAINT
2003
IEEE
15 years 3 months ago
Secure Link State Routing for Mobile Ad Hoc Networks
The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, securit...
Panagiotis Papadimitratos, Zygmunt J. Haas
CNSR
2008
IEEE
130views Communications» more  CNSR 2008»
15 years 6 days ago
Could Proactive Link-State Routed Wireless Networks Benefit from Local Fast Reroute?
The communication performance in wireless networks is often heavily influenced by failures caused by node mobility and radio disturbance. Proactive linkstate routing protocols lik...
Audun Fosselie Hansen, Geir Egeland, Paal Engelsta...