Sciweavers

732 search results - page 23 / 147
» TCP-aware Source Routing in Mobile Ad Hoc Networks
Sort
View
PERCOM
2010
ACM
14 years 10 months ago
Privacy-enhanced social network routing in opportunistic networks
Opportunistic networking - forwarding messages in a disconnected mobile ad hoc network via any encountered nodes - otters a new mechanism for exploiting the mobile devices that man...
Iain Parris, Greg Bigwood, Tristan Henderson
74
Voted
ADHOC
2007
108views more  ADHOC 2007»
14 years 12 months ago
A self-healing On-demand Geographic Path Routing Protocol for mobile ad-hoc networks
We present a self-healing On-demand Geographic Path Routing Protocol (OGPR) for mobile ad-hoc networks. OGPR is an efficient, stateless, and scalable routing protocol that inherit...
Venkata C. Giruka, Mukesh Singhal
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 6 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
85
Voted
HASE
2007
IEEE
15 years 3 months ago
Development of Custom Selling System Using Ad Hoc Networks
Recently, many routing protocols and applications for mobile ad hoc networks have been proposed. However, most of them are tested through the simulation experiments, but are not d...
Masato Asada, Tomoyuki Ohta, Kenji Ishida, Yoshiak...
IJACI
2010
164views more  IJACI 2010»
14 years 10 months ago
Exploring Multi-Path Communication in Hybrid Mobile Ad Hoc Networks
Abstract. Ambient computing requires the integration of multiple mobile heterogeneous networks. Multi-path communication, in such scenarios, can provide reliability and privacy ben...
Roberto Speicys Cardoso, Mauro Caporuscio