Sciweavers

540 search results - page 69 / 108
» An Overview of MANETs Simulation
Sort
View
IWCMC
2009
ACM
14 years 2 months ago
Probabilistic counter-based route discovery for mobile ad hoc networks
Conventional on-demand route discovery for ad hoc routing protocols extensively use simple flooding, which could potentially lead to high channel contention, causing redundant ret...
Aminu Mohammed, Mohamed Ould-Khaoua, Lewis M. Mack...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 2 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
NCA
2007
IEEE
14 years 2 months ago
On the Evaluation of Shortest Journeys in Dynamic Networks
The assessment of routing protocols for wireless networks is a difficult task, because of the networks’ highly dynamic behavior and the absence of benchmarks. However, some of ...
Afonso Ferreira, Alfredo Goldman, Julian Monteiro
MSWIM
2006
ACM
14 years 1 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
MOBICOM
1999
ACM
14 years 1 days ago
The Broadcast Storm Problem in a Mobile ad hoc Network
Broadcasting is a common operation in a network to resolve many issues. In a mobile ad hoc network (MANET) in particular, due to host mobility, such operations are expected to be e...
Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, Jang-Pi...