Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
We study the performance of ant routing for static and dynamic network topologies. We also compare the performance of ant routing with AODV and DSR for ad hoc networks. The simula...
Real-time multimedia transport has stringent bandwidth, delay, and loss requirements. Supporting this application in current wireless ad hoc networks is a challenge. Such networks...
The emergence of mobile ad hoc sensor networks has brought new challenges to traditional network design. This paper focuses on the study at the application layer. In specific, it...
Caching is an important technique to support pervasive Internet access. Cache consistency measures the deviation between the cached data and the source data. In mobile computing e...