Sciweavers

2691 search results - page 112 / 539
» Securing Ad Hoc Networks
Sort
View
IWSEC
2010
Springer
15 years 2 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
MOBIHOC
2004
ACM
16 years 4 months ago
Using labeled paths for loop-free on-demand routing in ad hoc networks
We present the Feasible Label Routing (FLR) protocol for mobile ad hoc networks, which uses path information to establish routes to destinations on demand. FLR enables loopfree in...
Hari Rangarajan, J. J. Garcia-Luna-Aceves
ICC
2007
IEEE
15 years 10 months ago
Detecting Node Misbehavior in Ad hoc Networks
—Ad hoc networks employ a decentralized unstructured networking model that relies on node cooperation for key network functionalities such as routing and medium access. In this p...
M. Tamer Refaei, Yanxia Rong, Luiz A. DaSilva, Hye...
AINTEC
2007
Springer
15 years 10 months ago
Quality-of-Service Multicast Overlay Spanning Tree Algorithms for Wireless Ad Hoc Networks
In this article, we explore modified versions of Multicast Overlay Spanning Tree algorithms (MOST) to support quality of service for wireless ad hoc networks. These algorithms (Q-...
Georgios Rodolakis, Cedric Adjih, Anis Laouiti, Sa...
ICAC
2005
IEEE
15 years 10 months ago
Self-Configuring and Optimizing Mobile Ad Hoc Networks
We present the design and implementation of a working system that enables self-configuration and self-optimization in mobile ad hoc networks (MANETs) by exploiting context awarene...
Apostolos Malatras, George Pavlou, Stylianos Gouve...