Sciweavers

369 search results - page 24 / 74
» Reducing Security Overhead for Mobile Networks
Sort
View
110
Voted
IWCMC
2009
ACM
15 years 8 months ago
Probabilistic counter-based route discovery for mobile ad hoc networks
Conventional on-demand route discovery for ad hoc routing protocols extensively use simple flooding, which could potentially lead to high channel contention, causing redundant ret...
Aminu Mohammed, Mohamed Ould-Khaoua, Lewis M. Mack...
132
Voted
ICDCSW
2000
IEEE
15 years 6 months ago
Fisheye State Routing in Mobile Ad Hoc Networks
In this paper, we present a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce ...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen
JNW
2006
149views more  JNW 2006»
15 years 1 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
ICWN
2004
15 years 3 months ago
Does Cluster Architecture Enhance Performance Scalability of Clustered Mobile Ad Hoc Networks?
This paper explains and evaluates the performance of a cluster architecture-based routing protocol, called Link Cluster Protocol (LCP), in mobile ad hoc networks (MANETs). LCP show...
Myeong L. Lim, Chansu Yu
109
Voted
IPPS
2005
IEEE
15 years 7 months ago
A Lightweight Scheme for Auto-configuration in Mobile Ad Hoc Networks
An efficient addressing scheme is necessary for auto-configuration and seamless communication in pervasive computing environments. In this paper, we propose an efficient and simple...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi