Abstract—In hierarchical mobile ad hoc networks, the architectual stability is a key factor in determining the network performance. There are many solutions proposed to construct...
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Abstract—Recently, many efforts have been made to develop more efficient Inter-Vehicle Communication (IVC) protocols for ondemand route planning according to observed traffic con...
— Nodes forming mobile ad hoc networks (MANET) nodes can be logically partitioned into 1) a selfish user agent serving the interests of the end user (owner) of the mobile device...
—In this paper, we propose a physical (PHY) - medium access control (MAC) cross-layer protocol for ad hoc networks with antenna-array-equipped nodes that employ single-antenna tr...