Sciweavers

1835 search results - page 98 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
SASN
2006
ACM
15 years 5 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
MOBIHOC
2003
ACM
15 years 10 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
74
Voted
ICMCS
2005
IEEE
85views Multimedia» more  ICMCS 2005»
15 years 4 months ago
Personally Customizable Group Navigation System Using Cellular Phones and Wireless Ad-Hoc Communication
Due to the progress of portable computing devices such as PDAs, cellular phones and small sized PCs, many personal navigation systems have been developed which navigate their user...
Yoshitaka Nakamura, Guiquan Ren, Masatoshi Nakamur...
INFOCOM
2008
IEEE
15 years 5 months ago
Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation
Abstract— In this paper we use an information-theoretic formulation for characterizing the minimum routing overhead of link state routing in a mobile ad hoc network. We formulate...
Di Wang, Alhussein A. Abouzeid
NETWORKING
2004
15 years 15 days ago
A-STAR: A Mobile Ad Hoc Routing Strategy for Metropolis Vehicular Communications
Abstract. One of the major issues that affect the performance of Mobile Ad hoc NETworks (MANET) is routing. Recently, position-based routing for MANET is found to be a very promisi...
Boon-Chong Seet, Genping Liu, Bu-Sung Lee, Chuan H...