We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Abstract— We consider the performance of underwater acoustic ad-hoc networks. We assume a uniform distribution of the nodes over a finite area. The node-to-node channel is model...
This paper presents the ADHOCFS file system for mobile users, which realizes transparent, adaptive file access according to the users’ specific situations (e.g., device in us...
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
—Wireless ad hoc networks are connected to the fixed Internet by means of Internet gateways. Whenever a node within the ad hoc network wishes to communicate with a host in the I...