Sciweavers

766 search results - page 99 / 154
» Securing Ad hoc Routing Protocols
Sort
View
SECON
2008
IEEE
15 years 5 months ago
Immunity-Based Epidemic Routing in Intermittent Networks
– In this research, we propose to modify and extend epidemic routing used in intermittent networks. In particular, we propose to include immunity-based information disseminated i...
Padma Mundur, Matthew Seligman, Jin Na Lee
PE
2007
Springer
175views Optimization» more  PE 2007»
14 years 10 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
SASN
2003
ACM
15 years 4 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
WICOMM
2011
14 years 6 months ago
The effects of shadow-fading on QoS-aware routing and admission control protocols designed for multi-hop MANETs
—Providing quality-of-service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralised coordin...
Lajos Hanzo, Rahim Tafazolli
ICWN
2003
15 years 17 days ago
Performance of Mobile Ad Hoc Network in Constrained Mobility Pattern
Mobile Ad Hoc Networks (MANET) performance is affected by a number of factors, eg. speed, node density. In this paper we will focus on the effect of constrained mobility on the per...
Bu-Sung Lee, Kai Juan Wong, Boon-Chong Seet, Lijua...