Sciweavers

908 search results - page 104 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
WIOPT
2010
IEEE
14 years 10 months ago
Effect of limited topology knowledge on opportunistic forwarding in ad hoc wireless networks
—Opportunistic forwarding is a simple scheme for packet routing in ad hoc wireless networks such as duty cycling sensor networks in which reducing energy consumption is a princip...
Prithwish Basu, Saikat Guha
ICNP
2002
IEEE
15 years 4 months ago
Performance of Collision Avoidance Protocols in Single-Channel Ad Hoc Networks
This paper presents the first analytical model to derive the saturation throughput of collision avoidance protocols in multi-hop ad hoc networks with nodes randomly placed accord...
Yu Wang, J. J. Garcia-Luna-Aceves
INFOCOM
2006
IEEE
15 years 5 months ago
Cross-Layer Congestion Control, Routing and Scheduling Design in Ad Hoc Wireless Networks
Abstract— This paper considers jointly optimal design of crosslayer congestion control, routing and scheduling for ad hoc wireless networks. We first formulate the rate constrai...
Lijun Chen, Steven H. Low, Mung Chiang, John C. Do...
WCNC
2008
IEEE
15 years 6 months ago
Mobility-Assisted Location Management for Vehicular Ad Hoc Networks
— Vehicular Ad-hoc Networks (VANETs) are gaining importance for inter-vehicle communication, because they allow for the local communication between vehicles without any infrastru...
Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 6 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana