Sciweavers

766 search results - page 37 / 154
» Securing Ad hoc Routing Protocols
Sort
View
78
Voted
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 4 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
MOBIHOC
2001
ACM
15 years 10 months ago
Implicit source routes for on-demand ad hoc network routing
In an ad hoc network, the use of source routing has many advantages, including simplicity, correctness, and flexibility. For example, all routing decisions for a packet are made b...
Yih-Chun Hu, David B. Johnson
GI
2004
Springer
15 years 4 months ago
Providing Service Continuity in Ad Hoc Networks
: Most of the investigations on ad hoc protocols do not consider the fact that future wireless networks are capable to adapt their behaviour to the channel situation. These adaptin...
Erik Weiss, Bangnan Xu, Sven Hischke
ADHOC
2005
170views more  ADHOC 2005»
14 years 11 months ago
An ad hoc networking scheme in hybrid networks for emergency communications
This paper describes an ad hoc networking scheme and routing protocol for emergency communications. The objective of the network is to collect damage assessment information quickl...
Takahiro Fujiwara, Takashi Watanabe
87
Voted
ADHOC
2005
100views more  ADHOC 2005»
14 years 11 months ago
Robust position-based routing for wireless ad hoc networks
We consider a wireless ad hoc network composed of a set of wireless nodes distributed in a two dimensional plane. Several routing protocols based on the positions of the mobile ho...
Kousha Moaveninejad, Wen-Zhan Song, Xiang-Yang Li