Sciweavers

908 search results - page 5 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
IWSOS
2007
Springer
15 years 3 months ago
A New Approach to Adaptive Multi-routing Protocol for Mobile Ad Hoc Network
A routing protocol is designed considering a particular environment all the time which is not possible in the case of practical ad hoc networks. Because of the uncertainty in topol...
Ung Heo, Deepak G. C., Jaeho Choi
92
Voted
INFOCOM
2000
IEEE
15 years 1 months ago
Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the perf...
Samir Ranjan Das, Charles E. Perkins, Elizabeth M....
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 3 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
89
Voted
WOWMOM
2005
ACM
138views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A Scenario-Based Performance Evaluation of Multicast Routing Protocols for Ad Hoc Networks
Current ad hoc multicast routing protocols have been designed to build and maintain a tree or mesh in the face of a mobile environment, with fast reaction to network changes in or...
Manoj Pandey, Daniel Zappala
INFOCOM
2010
IEEE
14 years 8 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...