Sciweavers

908 search results - page 162 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
PODC
2003
ACM
15 years 2 months ago
Geometric ad-hoc routing: of theory and practice
All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc rout...
Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Z...
ICC
2007
IEEE
220views Communications» more  ICC 2007»
15 years 3 months ago
Broadcasting Protocols for Multi-Radio Multi-Channel and Multi-Rate Mesh Networks
— A vast amount of broadcasting protocols has been developed for wireless ad hoc networks. To the best of our knowledge, however, these protocols assume a single-radio singlechan...
Min Song, Jun Wang, Qun Hao
TON
2008
109views more  TON 2008»
14 years 9 months ago
Efficient routing in intermittently connected mobile networks: the single-copy case
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
DIMVA
2004
14 years 11 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
INFOCOM
2002
IEEE
15 years 2 months ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...