Sciweavers

796 search results - page 82 / 160
» Secure Multipath Routing for Mobile Ad Hoc Networks
Sort
View
ADHOCNOW
2004
Springer
15 years 3 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
TON
2012
13 years 7 days ago
Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
—This paper presents DAWN, a declarative platform that creates highly adaptive policy-based MANET protocols. DAWN leverages declarative networking techniques to achieve extensibl...
Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwi...
IFIP
2003
Springer
15 years 3 months ago
Towards a Novel Transport Protocol for Ad Hoc Networks
The TCP protocol exhibits poor performance in multi-hop Mobile Ad Hoc Networks (MANETs). The ultimate reason for this is that MANETs behave in a significantly different way from ...
Giuseppe Anastasi, Andrea Passarella
CORR
2010
Springer
183views Education» more  CORR 2010»
14 years 10 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
ICN
2005
Springer
15 years 3 months ago
Reliable Mobile Ad Hoc P2P Data Sharing
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...