Sciweavers

766 search results - page 64 / 154
» Securing Ad hoc Routing Protocols
Sort
View
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
15 years 1 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
SENSYS
2003
ACM
15 years 4 months ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
MOBIHOC
2001
ACM
15 years 10 months ago
Effects of wireless physical layer modeling in mobile ad hoc networks
In most studies on mobile ad hoc networks (MANET), simulation models are used for the evaluation of devices and protocols. Typically, such simulations focus on the specific higher...
Mineo Takai, Jay Martin, Rajive Bagrodia
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
15 years 4 months ago
TPA: A Transport Protocol for Ad Hoc Networks
Several previous works have shown that TCP exhibits poor performance in Mobile Ad Hoc Networks (MANETs). The ultimate reason for this is that MANETs behave in a significantly diff...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
ADHOC
2008
88views more  ADHOC 2008»
14 years 11 months ago
Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking
As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper...
Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansle...