Sciweavers

766 search results - page 65 / 154
» Securing Ad hoc Routing Protocols
Sort
View
TPDS
2008
231views more  TPDS 2008»
14 years 11 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
AINA
2010
IEEE
15 years 4 months ago
Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks
— Growing popularity of wireless ad hoc networks leads to higher demands on performance of all TCP/IP stack layers. Usually ad hoc networks operate according to IEEE 802.11 stand...
Stepan Ivanov, Dmitri Botvich, Sasitharan Balasubr...
83
Voted
JOIN
2006
113views more  JOIN 2006»
14 years 11 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
CORR
2010
Springer
299views Education» more  CORR 2010»
14 years 11 months ago
A New Energy Efficient Routing Algorithm Based on a New Cost Function in Wireless Ad hoc Networks
Wireless ad hoc networks are power constrained since nodes operate with limited battery energy. Thus, energy consumption is crucial in the design of new ad hoc routing protocols. I...
Mehdi Lotfi, Sam Jabbehdari, Majid Asadi Shahmirza...
COMCOM
2004
153views more  COMCOM 2004»
14 years 11 months ago
BLR: beacon-less routing algorithm for mobile ad hoc networks
Routing of packets in mobile ad hoc networks with a large number of nodes or with high mobility is a very difficult task and current routing protocols do not really scale well wit...
Marc Heissenbüttel, Torsten Braun, Thomas Ber...