Sciweavers

1165 search results - page 60 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
ADHOC
2005
176views more  ADHOC 2005»
14 years 11 months ago
A survey of Mobile IP in cellular and Mobile Ad-Hoc Network environments
The Internet has become ubiquitous and there has been tremendous growth in wireless communications in recent years. Many wireless communication techniques are commercially availab...
Tin Yu Wu, Ching-Yang Huang, Han-Chieh Chao
GLOBECOM
2007
IEEE
15 years 14 hour ago
Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks
—In the context of mobile ad hoc networks (MANETs) routing, we propose a clustering algorithm called Connectivity, Energy and Mobility driven Clustering Algorithm (CEMCA). The ai...
Fatiha Djemili Tolba, Damien Magoni, Pascal Lorenz
INFOCOM
2010
IEEE
14 years 10 months ago
Impact of Correlated Mobility on Delay-Throughput Performance in Mobile Ad-Hoc Networks
—We extend the analysis of the scaling laws of wireless ad hoc networks to the case of correlated nodes movements, which are commonly found in real mobility processes. We conside...
Delia Ciullo, Valentina Martina, Michele Garetto, ...
GLOBECOM
2008
IEEE
15 years 28 days ago
A Framework for Dual-Agent MANET Routing Protocols
— Nodes forming mobile ad hoc networks (MANET) nodes can be logically partitioned into 1) a selfish user agent serving the interests of the end user (owner) of the mobile device...
Brian L. Gaines, Mahalingam Ramkumar
CROSSROADS
2004
108views more  CROSSROADS 2004»
14 years 11 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...