Sciweavers

908 search results - page 114 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
IJNSEC
2007
204views more  IJNSEC 2007»
14 years 11 months ago
Enhanced DSR for MANET with Improved Secured Route Discovery and QoS
Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless networ...
Anil Rawat, Prakash Dattatraya Vyavahare, Ashwani ...
AINA
2007
IEEE
15 years 6 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
ICWN
2004
15 years 1 months ago
Demand-Driven Clustering in MANETs
Abstract-- Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far [1], all these protocols are proactive...
Curt Cramer, Oliver Stanze, Kilian Weniger, Martin...
GLOBECOM
2009
IEEE
15 years 6 months ago
A Practical Approach for Providing QoS in Multichannel Ad-Hoc Networks Using Spectrum Width Adaptation
Abstract—Multichannel wireless networks provide the flexibility to utilize the available spectrum efficiently for achieving improved system performance in terms of throughput a...
Vijay Raman, Matthew C. Caesar
IFIP
2003
Springer
15 years 5 months ago
JMS on Mobile Ad Hoc Networks
The Java Message Service (JMS) provides a standard asynchronous messaging API, which simplifies the construction of loosely coupled, distributed applications. This paper describes ...
Einar Vollset, David B. Ingham, Paul D. Ezhilchelv...