Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Publish/Subscribe is an interesting communication paradigm because it fosters a high degree of decoupling between the communicating parties and provides the ability to communicate ...
Mobile devices like PDAs or mobile phones have become widespread. Similarly, network functionality like GSM, Bluetooth, or WLAN has become standard. Nevertheless, not many applica...
— This paper presents an Emergent Ad hoc Routing Algorithm with QoS provision (EARA-QoS). This ad hoc QoS routing algorithm is based on a swarm intelligence inspired routing infr...
Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Consta...