Sciweavers

1835 search results - page 147 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
ICDCSW
2005
IEEE
15 years 4 months ago
Directional NAV Indicators and Orthogonal Routing for Smart Antenna Based Ad Hoc Networks
Smart antennas are expected to enhance scalability in ad hoc networks. This paper at first evaluates three directional MAC protocols, DMAC, MMAC and SWAMP as well as the omni-dir...
Masanori Sekido, Masanori Takata, Masaki Bandai, T...
87
Voted
LCN
2006
IEEE
15 years 5 months ago
Achieving Fairness in IEEE 802.11 Ad Hoc Networks
IEEE 802.11 has become the main technology in local area wireless networks. However, performance anomalies, especially, in terms of fairness, arise in its use in ad hoc networks. ...
Fanilo Harivelo, Pascal Anelli
84
Voted
AINTEC
2007
Springer
15 years 5 months ago
Quality-of-Service Multicast Overlay Spanning Tree Algorithms for Wireless Ad Hoc Networks
In this article, we explore modified versions of Multicast Overlay Spanning Tree algorithms (MOST) to support quality of service for wireless ad hoc networks. These algorithms (Q-...
Georgios Rodolakis, Cedric Adjih, Anis Laouiti, Sa...
111
Voted
IEEECIT
2010
IEEE
14 years 9 months ago
Fuzzy Location Service for Mobile Ad Hoc Networks
Abstract—Over the past years, location-based routing protocols have been studied extensively in mobile ad hoc networks (MANETs). However, how to efficiently provide the location ...
Yongming Xie, Guojun Wang, Jie Wu
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
15 years 21 days ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu