Sciweavers

1835 search results - page 19 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
AINA
2007
IEEE
15 years 4 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
LCN
2003
IEEE
15 years 2 months ago
Regional Gossip Routing for Wireless Ad Hoc Networks
Abstract—Many routing protocols have been proposed for wireless ad hoc networks, and most of them are based on some variants of flooding. Thus many routing messages are propagat...
Xiang-Yang Li, Kousha Moaveninejad, Ophir Frieder
ICNP
2005
IEEE
15 years 3 months ago
Efficient Hop ID based Routing for Sparse Ad Hoc Networks
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu
93
Voted
IAJIT
2008
145views more  IAJIT 2008»
14 years 9 months ago
NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks
: A Mobile Ad Hoc Network (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies without...
Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Md...
MOBIHOC
2001
ACM
15 years 9 months ago
Implicit source routes for on-demand ad hoc network routing
In an ad hoc network, the use of source routing has many advantages, including simplicity, correctness, and flexibility. For example, all routing decisions for a packet are made b...
Yih-Chun Hu, David B. Johnson