Sciweavers

1558 search results - page 34 / 312
» Mobility helps security in ad hoc networks
Sort
View
VLDB
2008
ACM
133views Database» more  VLDB 2008»
16 years 1 days ago
A survey of data replication techniques for mobile ad hoc network databases
Prasanna Padmanabhan, Le Gruenwald, Anita Vallur, ...
COLCOM
2008
IEEE
15 years 6 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
ANTSW
2008
Springer
15 years 1 months ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 6 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
ISPAN
1999
IEEE
15 years 4 months ago
Supporting Hierarchy and Heterogeneous Interfaces in Multi-Hop Wireless Ad Hoc Networks
Much progress has been made toward solving the problem of routing packets inside an ad hoc network, but there are presently no complete proposals for connecting ad hoc networks to...
Josh Broch, David A. Maltz, David B. Johnson