Sciweavers

908 search results - page 115 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
ADHOC
2007
122views more  ADHOC 2007»
14 years 12 months ago
Modeling and analyzing the correctness of geographic face routing under realistic conditions
Geographic protocols are very promising for wireless ad hoc and sensor networks due to the low state storage and low message overhead. Under certain idealized conditions, geograph...
Karim Seada, Ahmed Helmy, Ramesh Govindan
JSAC
2011
137views more  JSAC 2011»
14 years 2 months ago
A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Yen-Cheng Lai, Phone Lin, Wanjiun Liao, Chung-Min ...
IFIP
2003
Springer
15 years 5 months ago
Self-Organising Node Address Management in Ad Hoc Networks
Whilst much effort has been put into the creation of routing algorithms to handle all sorts of mobility scenarios in ad-hoc networks, other fundamental issues, such as the addresse...
Stephen Toner, Donal O'Mahony
COORDINATION
2007
Springer
15 years 6 months ago
A Calculus for Mobile Ad Hoc Networks
We suggest a Calculus for Mobile Ad Hoc Networks, CMAN. A node in a network is a processes equipped with a location, it may communicate with other nodes using synchronous local bro...
Jens Chr. Godskesen
ACISP
2006
Springer
15 years 3 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo