Simulated, false location reports can be an effective way to confuse a privacy attacker. When a mobile user must transmit his or her location to a central server, these location re...
Abstract—Delay tolerant Ad-hoc Networks leverage the mobility of relay nodes to compensate for lack of permanent connectivity and thus enable communication between nodes that are...
—Vehicular ad hoc network protocol with hybrid relay architecture is proposed for improving the success ratio. Access gateway estimation and a probability table based on the rout...
—In vehicular ad-hoc networks (VANETs), mobility is one of key characteristics that have a significant effect on routing performance because it causes dynamic changes of network...
We present a process algebra for modeling and reasoning about Mobile Ad hoc Networks (MANETs) and their protocols. In our algebra we model the essential modeling concepts of ad ho...