Sciweavers

1267 search results - page 12 / 254
» On the scalability of IEEE 802.11 ad hoc networks
Sort
View
MOBIQUITOUS
2007
IEEE
15 years 3 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
ICDCSW
2003
IEEE
15 years 2 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
INFOCOM
2005
IEEE
15 years 3 months ago
Routing in ad hoc networks: a theoretical framework with practical implications
— In this paper, information theoretic techniques are used to derive analytic expressions for the minimum expected length of control messages exchanged by proactive routing in a ...
Nianjun Zhou, Alhussein A. Abouzeid
WCNC
2008
IEEE
15 years 3 months ago
A Density Adaptive Routing Protocol for Large-Scale Ad Hoc Networks
Abstract—Position-based routing protocols use location information to refine the traditional packet flooding method in mobile ad hoc networks. They mainly focus on densely and ...
Zhizhou Li, Yaxiong Zhao, Yong Cui, Dong Xiang
GLOBECOM
2009
IEEE
15 years 4 months ago
Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks
—Mobile ad-hoc networks (MANETs) usually contain sparse or even empty regions called holes. The local optimum problem will occur when routing packets meet holes in the network. I...
Peiqiang Li, Guojun Wang, Jie Wu, Hong-Chuan Yang