Sciweavers

1835 search results - page 233 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
WD
2010
14 years 7 months ago
CAODV: Routing in mobile ad-hoc cognitive radio networks
This paper deals with the routing in cognitive mobile ad hoc networks. We propose to modify the widely adopted Ad-hoc On-demand Distance Vector (AODV) protocol [1] in order to assu...
Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello...
WINET
2011
14 years 5 months ago
Sleep scheduling with expected common coverage in wireless sensor networks
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor...
Eyuphan Bulut, Ibrahim Korpeoglu
IJNSEC
2007
122views more  IJNSEC 2007»
14 years 10 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
EURONGI
2004
Springer
15 years 1 months ago
Performance of Internet Access Solutions in Mobile Ad Hoc Networks
Abstract. Although an autonomous mobile ad hoc network (MANET) is useful in many scenarios, a MANET connected to the Internet is more desirable. This interconnection is achieved by...
Ali Hamidian, Ulf Körner, Anders Nilsson
GLOBECOM
2007
IEEE
15 years 4 months ago
Stability of Hierarchical Mobile Ad Hoc Networks
Abstract—In hierarchical mobile ad hoc networks, the architectual stability is a key factor in determining the network performance. There are many solutions proposed to construct...
Yi Xu, Wenye Wang