Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Minimal configuration and quick deployment of ad hoc networks make it suitable for numerous applications such as emergency situations, border monitoring, and military missions, e...
Developing and evaluating protocols and applications for mobile ad-hoc networks requires significant organisational effort when real mobile ad-hoc networks with several mobile te...
Michael Matthes, Holger Biehl, Michael Lauer, Oswa...
The purpose of MARIAN is to investigate the degree of suitability for mobile agent technology in routing, topology discovery, and automatic network reconfiguration in ad-hoc wirel...
Nikos Migas, William J. Buchanan, Kevin A. McArtne...