Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
The use of contention-based MAC protocols combined with hidden terminal problems make multi-hop wireless ad hoc networks much more sensitive to load and congestion than wired netw...
Ken Tang, Katia Obraczka, Sung-Ju Lee, Mario Gerla
In most of the proposed clustering algorithms for wireless ad hoc networks, the cluster-heads form a dominating set in the network topology. A variant of dominating set which is mo...
— Gupta and Kumar showed that throughput in a static random wireless network increases with the amount of hopping. In a subsequent paper (2004), it was shown that although throug...
Increasing need for people to be “connected”; while at the same time remain as mobile as ever poses several interesting issues in wireless networks. It is conceivable in the n...
Alok Nandan, Shirshanka Das, Giovanni Pau, Mario G...