Sciweavers

1835 search results - page 96 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
MOBIHOC
2002
ACM
15 years 10 months ago
Weak duplicate address detection in mobile ad hoc networks
Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirabl...
Nitin H. Vaidya
ICNP
2002
IEEE
15 years 4 months ago
A Secure Routing Protocol for Ad Hoc Networks
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protoc...
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine...
CORR
2010
Springer
164views Education» more  CORR 2010»
14 years 11 months ago
Performance Comparison of Link, Node and Zone Disjoint Multi-path Routing Strategies and Minimum Hop Single Path Routing for Mob
The high-level contribution of this paper is a simulation-based analysis to evaluate the tradeoffs between lifetime and hop count of link-disjoint, node-disjoint and zone-disjoint...
Natarajan Meghanathan
ICNP
2002
IEEE
15 years 4 months ago
Design and Implementation of a TCP-Friendly Transport Protocol for Ad Hoc Wireless Networks
Transport protocol design for mobile ad hoc networks is challenging because of unique issues, including mobilityinduced disconnection, reconnection, and high out-of-order delivery...
Zhenghua Fu, Benjamin Greenstein, Xiaoqiao Meng, S...
EJWCN
2010
119views more  EJWCN 2010»
14 years 6 months ago
Simulations of the Impact of Controlled Mobility for Routing Protocols
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Valeria Loscrì, Enrico Natalizio, Carmelo C...