Sciweavers

908 search results - page 99 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
86
Voted
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 6 months ago
ESPRIT-Based Directional MAC Protocol for Mobile Ad Hoc Networks
— The use of directional antennas in mobile ad hoc networks has shown to offer large potential throughput gains relative to omnidirectional antennas. When used in ad hoc networks...
Kun Liu, Walaa Hamouda, Amr Youssef
GI
2005
Springer
15 years 5 months ago
Security Extensions to MMARP Through Cryptographically Generated Addresses
: The MMARP protocol provides multicast routing in hybrid environments in which an ad hoc network is connected to the Internet. As many other routing protocols it was initially des...
Francisco J. Galera, Pedro M. Ruiz, Antonio F. G&o...
WINET
2010
112views more  WINET 2010»
14 years 10 months ago
On routing with guaranteed delivery in three-dimensional ad hoc wireless networks
We study routing algorithms for three-dimensional ad hoc networks that guarantee delivery and are k-local, i.e., each intermediate node v’s routing decision only depends on knowl...
Stephane Durocher, David G. Kirkpatrick, Lata Nara...
AINA
2008
IEEE
15 years 6 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 6 months ago
A Spreading Code MAC Protocol for Multi-Hop Wireless Ad Hoc Networks
— We propose a spreading code medium access control (MAC) protocol with each node equipped with single transceiver for wireless ad hoc networks, based on the code division multip...
Hang Su, Xi Zhang