12 years 7 months ago
The effects of shadow-fading on QoS-aware routing and admission control protocols designed for multi-hop MANETs
—Providing quality-of-service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralised coordin...
Lajos Hanzo, Rahim Tafazolli
12 years 9 months ago
Efficient Medium Access Control with IEEE 802.11 for Mobile Ad Hoc Networks
The IEEE 802.11 Medium Access Control (MAC) protocol has inherent weakness of channel wastage while operating a Mobile Ad hoc Network (MANET). In this paper, we therefore propose s...
Zalal Uddin Mohammad Abusina, Mesbah Uddin, Salahu...
12 years 9 months ago
Self-optimizing routing in MANETs with multi-class flows
In this paper we show how game theory and Gibbs sampling techniques can be used to design a self-optimizing algorithm for minimizing end-to-end delays for all flows in a multi-clas...
Pierre Coucheney, Bruno Gaujal, Corinne Touati
12 years 10 months ago
Privacy-enhanced social network routing in opportunistic networks
Opportunistic networking - forwarding messages in a disconnected mobile ad hoc network via any encountered nodes - otters a new mechanism for exploiting the mobile devices that man...
Iain Parris, Greg Bigwood, Tristan Henderson
79views more  JCM 2007»
12 years 12 months ago
Time Slot Assignment for Maximum Bandwidth in a Mobile Ad Hoc Network
—Time slot assignment is essential to provide the calculated bandwidth in a TDMA (Time Division Multiple Access)-based mobile ad hoc network (MANET), which is a focus of attentio...
Jianping Li, Yasushi Wakahara
142views more  JCIT 2007»
12 years 12 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
125views more  TMC 2008»
12 years 12 months ago
Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks
A k-hop dominating set is a subset of nodes such that each node not in the set can be reached within k hops from at least one node in the set. A connected k-hop dominating set can ...
Hong-Yen Yang, Chia-Hung Lin, Ming-Jer Tsai
117views more  JUCS 2006»
12 years 12 months ago
Resource Efficient Maintenance of Wireless Network Topologies
Abstract: Multiple hop routing in mobile ad hoc networks can minimize energy consumption and increase data throughput. Yet, the problem of radio interferences remain. However if th...
Tamás Lukovszki, Christian Schindelhauer, K...
156views more  JSAC 2006»
12 years 12 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
149views more  JNW 2006»
12 years 12 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo