Sciweavers

257 search results - page 25 / 52
» A Secure Data Transmission Scheme for Mobile Ad Hoc Networks
Sort
View
WCNC
2008
IEEE
14 years 1 months ago
On Spatial Reuse and Capture in Ad Hoc Networks
—Neighbors of both the transmitter and the receiver must keep quiet in a 802.11 wireless network as it requires bidirectional exchange, i.e., nodes reverse their roles as transmi...
Naveen Santhapuri, Srihari Nelakuditi, Romit Roy C...
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 7 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
MSWIM
2005
ACM
14 years 29 days ago
A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks
In the last few years, the advance of multimedia applications has prompted researchers to undertake the task of routing multimedia data through Manet. This task is rather difficul...
Saida Ziane, Abdelhamid Mellouk
CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 7 months ago
Stochastic Analysis of Non-slotted Aloha in Wireless Ad-Hoc Networks
: In this paper we propose two analytically tractable stochastic models of non-slotted Aloha for Mobile Ad-hoc NETworks (MANETs): one model assumes a static pattern of nodes while ...
Bartek Blaszczyszyn, Paul Mühlethaler
HICSS
2005
IEEE
172views Biometrics» more  HICSS 2005»
14 years 1 months ago
A Location Service Mechanism for Position-Based Multicasting in Wireless Mobile Ad hoc Networks
Abstract— In this paper we propose a novel location management scheme tailored for multicasting in Mobile Ad-hoc Networks (MANETs). We furthermore propose AMDLM, a locationbased ...
Yoav Sasson, David Cavin, André Schiper