Sciweavers

1083 search results - page 110 / 217
» Performance of Underwater Ad-Hoc Networks
Sort
View
ICPP
2003
IEEE
15 years 3 months ago
On Maximizing Lifetime of Multicast Trees in Wireless Ad hoc Networks
This paper presents a distributed algorithm called LREMiT for extending the lifetime of a source-based multicast tree in wireless ad hoc networks (WANET). The lifetime of a multic...
Bin Wang, Sandeep K. S. Gupta
INFOCOM
2003
IEEE
15 years 3 months ago
Optimizing Route-Cache Lifetime in Ad Hoc Networks
—On-demand routing reduces the control overhead in mobile ad hoc networks, but it has the major drawback of introducing latency between route-request arrival and the determinatio...
Ben Liang, Zygmunt J. Haas
ICC
2007
IEEE
201views Communications» more  ICC 2007»
15 years 1 months ago
TMMAC: An Energy Efficient Multi-Channel MAC Protocol for Ad Hoc Networks
This paper presents a TDMA based multi-channel MAC protocol called TMMAC for Ad Hoc Networks. TMMAC requires only a single half-duplex radio transceiver on each node. In addition t...
Jingbin Zhang, Gang Zhou, Chengdu Huang, Sang Hyuk...
GLOBECOM
2009
IEEE
15 years 1 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
14 years 11 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu