Sciweavers

1675 search results - page 88 / 335
» Mobility Tracking for Mobile Ad Hoc Networks
Sort
View
IJNSEC
2007
122views more  IJNSEC 2007»
14 years 11 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
WINET
2010
163views more  WINET 2010»
14 years 9 months ago
On supporting reliable QoS in multi-hop multi-rate mobile ad hoc networks
Due to complicated situations such as node/link interference and traffic load, quality of service support in multi-hop multi-rate ad hoc networks remains a challenging issue. Furt...
Ming Li, B. Prabhakaran
84
Voted
COMCOM
2004
153views more  COMCOM 2004»
14 years 11 months ago
BLR: beacon-less routing algorithm for mobile ad hoc networks
Routing of packets in mobile ad hoc networks with a large number of nodes or with high mobility is a very difficult task and current routing protocols do not really scale well wit...
Marc Heissenbüttel, Torsten Braun, Thomas Ber...
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 5 months ago
Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks
— In a mobile ad hoc network, node cooperation in packet forwarding is required for the network to function properly. However, since nodes in this network usually have limited re...
Tiranuch Anantvalee, Jie Wu
SAB
2010
Springer
237views Optimization» more  SAB 2010»
14 years 10 months ago
BeeIP: Bee-Inspired Protocol for Routing in Mobile Ad-Hoc Networks
We introduce a new bee-inspired routing protocol for mobile ad hoc networks. Emphasis is given to the ability of bees to evaluate paths by considering several quality factors. In o...
Alexandros Giagkos, Myra S. Wilson