Sciweavers

1835 search results - page 21 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
76
Voted
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 4 months ago
Greedy Hop Distance Routing Using Tree Recovery on Wireless Ad Hoc and Sensor Networks
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
MSN
2005
Springer
114views Sensor Networks» more  MSN 2005»
15 years 3 months ago
A Directional Antenna Based Path Optimization Scheme for Wireless Ad Hoc Networks
Using directional antennas in wireless ad hoc networks is an attractive issue due to its potential advantages such as spatial reuse, low power consumption and low chance of interfe...
Sung-Ho Kim, Young-Bae Ko
GLOBECOM
2006
IEEE
15 years 3 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
WINET
2010
112views more  WINET 2010»
14 years 8 months ago
On routing with guaranteed delivery in three-dimensional ad hoc wireless networks
We study routing algorithms for three-dimensional ad hoc networks that guarantee delivery and are k-local, i.e., each intermediate node v’s routing decision only depends on knowl...
Stephane Durocher, David G. Kirkpatrick, Lata Nara...
VTC
2006
IEEE
15 years 3 months ago
On Link Reliability in Wireless Mobile Ad Hoc Networks
— In mobile ad hoc networks (MANETs), packets are forwarded by a series of nodes to the desired destination. Previously, we have studied the network connectivity of MANETs. In th...
Juki Wirawan Tantra, Chuan Heng Foh, Dongyu Qiu