Sciweavers

908 search results - page 23 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
WIOPT
2010
IEEE
14 years 7 months ago
A multiobjective performance evaluation framework for routing in wireless ad hoc networks
—Wireless ad hoc networks are seldom characterized by one single performance metric, yet the current literature lacks a flexible framework to assist in characterizing the design...
Katia Jaffrès-Runser, Mary R. Schurgot, Cri...
ICNP
2002
IEEE
15 years 2 months ago
A Secure Routing Protocol for Ad Hoc Networks
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protoc...
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine...
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 9 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
MONET
2002
418views more  MONET 2002»
14 years 9 months ago
On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks
An ad hoc network is a dynamically reconfigurable wireless network with no fixed infrastructure or central administration. Each host is mobile and must act as a router. Routing and...
Sung-Ju Lee, William Su, Mario Gerla
DIALM
1999
ACM
98views Algorithms» more  DIALM 1999»
15 years 1 months ago
Routing with guaranteed delivery in ad hoc wireless networks
We consider routing problems in ad hoc wireless networks modeled as unit graphs in which nodes are points in the plane and two nodes can communicate if the distance between them is...
Prosenjit Bose, Pat Morin, Ivan Stojmenovic, Jorge...