Sciweavers

7329 search results - page 63 / 1466
» Network Extractor Protocols
Sort
View
ADHOCNETS
2009
Springer
15 years 6 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
ICC
2007
IEEE
205views Communications» more  ICC 2007»
15 years 6 months ago
RLAR: Robust Link Availability Routing Protocol for Mobile Ad Hoc Networks
— Many previously proposed routing metrics and algorithms for ad hoc networks work well in static networks, however, when nodes are moving and wireless links may fail from time t...
Xueyuan Su, Sammy Chan, King Sun Chan
ICCSA
2004
Springer
15 years 5 months ago
A Cluster Based Hierarchical Routing Protocol for Mobile Networks
We propose a hierarchical, cluster based semi-distributed routing protocol for a mobile ad hoc network. The network graph is partitioned into clusters using heuristics and the shor...
Kayhan Erciyes, Geoffrey Marshall
IPPS
2003
IEEE
15 years 5 months ago
Ad Hoc Networks: A Protocol for Supporting QoS Applications
A delay-bounded service in wireless ad hoc networks is challenging, as ad hoc networks do not provide any type of guarantees. Several protocols have been proposed to support appli...
Lorenzo Donatiello, Marco Furini
EDCC
2010
Springer
15 years 4 months ago
Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities
Wireless networks are starting to be populated by interconnected devices that reveal remarkable hardware and software differences. This fact raises a number of questions on the ap...
Paolo Masci, Silvano Chiaradonna, Felicita Di Gian...