Sciweavers

1835 search results - page 75 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View

Lecture Notes
456views
16 years 8 months ago
Wireless and Mobile Networking
The lecture notes cover the following topics, CSE 574S Wireless and Mobile Networking: Course Overview, Wireless Networking Trends, A Review of Key Wireless Physical Layer Co...
Raj Jain
CIIT
2007
161views Communications» more  CIIT 2007»
14 years 11 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
MOBICOM
2003
ACM
15 years 3 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 4 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...