Sciweavers

766 search results - page 113 / 154
» Securing Ad hoc Routing Protocols
Sort
View
82
Voted
SIGMETRICS
2005
ACM
104views Hardware» more  SIGMETRICS 2005»
15 years 4 months ago
Message delay in MANET
A generic stochastic model with only two input parameters is introduced to evaluate the message delay in mobile ad hoc networks (MANETs) where nodes may relay messages. The Laplac...
Robin Groenevelt, Philippe Nain, Ger Koole
86
Voted
TMC
2008
83views more  TMC 2008»
14 years 11 months ago
A Swarm-Intelligence-Based Protocol for Data Acquisition in Networks with Mobile Sinks
This paper addresses the problem of data acquisition in ad hoc and sensor networks with mobile sinks and proposes a protocol based on swarm intelligence, SIMPLE, to route data in s...
Hua Yang, Fengji Ye, Biplab Sikdar
ICN
2007
Springer
15 years 5 months ago
Scalability of the OLSR Protocol with the Fish Eye Extension
— Multi-hop wireless ad-hoc networks are drawing more and more attention from both academic and industrial research. The lack of infrastructure makes those networks easy to deplo...
Dang Nguyen, Pascale Minet
VTC
2010
IEEE
242views Communications» more  VTC 2010»
14 years 9 months ago
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks
—Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the medium access control (MAC) and physical layers when designing a ...
Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue...
DIMVA
2004
15 years 16 days ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...