Sciweavers

1624 search results - page 123 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
ICC
2007
IEEE
163views Communications» more  ICC 2007»
15 years 7 months ago
An Auction based AODV Protocol for Mobile Ad Hoc Networks with Selfish Nodes
– In this paper, we propose an auction mechanism for routing in mobile ad hoc networks with selfish nodes. Our approach is to promote bidding for end-to-end routes, as opposed to...
Cenker Demir, Cristina Comaniciu
ICC
2000
IEEE
188views Communications» more  ICC 2000»
15 years 5 months ago
Route-Lifetime Assessment Based Routing (RABR) Protocol for Mobile Ad-Hoc Networks
—Owing to the absence of any static support structure, Ad-hoc networks are prone to link failures. The ‘shortest path seeking’ routing protocols may not lead to stable routes...
Sulabh Agarwal, Ashish Ahuja, Jatinder Pal Singh, ...
IEEECIT
2010
IEEE
14 years 11 months ago
Fuzzy Location Service for Mobile Ad Hoc Networks
Abstract—Over the past years, location-based routing protocols have been studied extensively in mobile ad hoc networks (MANETs). However, how to efficiently provide the location ...
Yongming Xie, Guojun Wang, Jie Wu
IFIP
2004
Springer
15 years 6 months ago
Multipath Power Sensitive Routing Protocol for Mobile Ad Hoc Networks
: Mobile Ad hoc Networks are characterized by multi-hop wireless links, without any infrastructure, and frequent host mobility. A plethora of routing protocols has been proposed. A...
Anand Prabhu Subramanian, A. J. Anto, Janani Vasud...
TIFS
2010
130views more  TIFS 2010»
14 years 8 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena