Sciweavers

25 search results - page 3 / 5
» Ad Hoc On-Demand Backup Node Setup Routing Protocol
Sort
View
ADHOC
2005
134views more  ADHOC 2005»
13 years 7 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
IJWIN
2002
111views more  IJWIN 2002»
13 years 7 months ago
Internet Connectivity for Ad Hoc Mobile Networks
The growing deployment rate of wireless LANs indicates that wireless networking is rapidly becoming a prevalent form of communication. As users become more accustomed to the use o...
Yuan Sun, Elizabeth M. Belding-Royer, Charles E. P...
WONS
2005
IEEE
14 years 29 days ago
Multipath Associativity Based Routing
Abstract:This paper introduces a series of new multipath routing protocols developed upon Associativity Based Routing (ABR) for wireless ad-hoc networks. ABR selects routes based o...
Patrick McCarthy, Dan Grigoras
EURONGI
2004
Springer
13 years 11 months ago
Performance of Internet Access Solutions in Mobile Ad Hoc Networks
Abstract. Although an autonomous mobile ad hoc network (MANET) is useful in many scenarios, a MANET connected to the Internet is more desirable. This interconnection is achieved by...
Ali Hamidian, Ulf Körner, Anders Nilsson
ICWN
2004
13 years 8 months ago
Demand-Driven Clustering in MANETs
Abstract-- Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far [1], all these protocols are proactive...
Curt Cramer, Oliver Stanze, Kilian Weniger, Martin...