Sciweavers

1165 search results - page 150 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
IJNM
2008
112views more  IJNM 2008»
15 years 1 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
INFOCOM
2012
IEEE
13 years 4 months ago
Capacity of distributed content delivery in large-scale wireless ad hoc networks
—In most existing wireless networks, end users obtain data content from the wired network, typically, the Internet. In this manner, virtually all of their traffic must go throug...
Wang Liu, Kejie Lu, Jianping Wang, Yi Qian, Tao Zh...
PAKDD
2007
ACM
238views Data Mining» more  PAKDD 2007»
15 years 8 months ago
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks
A mobile node in ad hoc networks may move arbitrarily and acts as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. Th...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Shun C...
IJAHUC
2007
99views more  IJAHUC 2007»
15 years 1 months ago
Simulation study of some PRMA-based protocols with channel reservation for data traffic
: Medium Access Control (MAC) and resource allocation are two challenging issues in mobile network. Packet reservation multiple access (PRMA) is considered as a promising MAC proto...
Xue Jun Li, Peter Han Joo Chong
WSNA
2003
ACM
15 years 7 months ago
Information-directed routing in ad hoc sensor networks
—In a sensor network, data routing is tightly coupled to the needs of a sensing task, and hence the application semantics. This paper introduces the novel idea of information-dir...
Juan Liu, Feng Zhao, Dragan Petrovic