Sciweavers

503 search results - page 62 / 101
» Benefit-based Data Caching in Ad Hoc Networks
Sort
View
DCOSS
2005
Springer
14 years 1 months ago
Distributed Proximity Maintenance in Ad Hoc Mobile Networks
We present an efficient distributed data structure, called the D-SPANNER, for maintaining proximity information among communicating mobile nodes. The D-SPANNER is a kinetic sparse...
Jie Gao, Leonidas J. Guibas, An Nguyen
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 2 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
INFOCOM
2007
IEEE
14 years 2 months ago
Transmit Power Distribution of Wireless Ad Hoc Networks with Topology Control
— Topology control and routing protocols are used by designers of wireless packet data networks to lower the node degree, simplify routing and lower the nodes’ energy consumpti...
Dan Avidor, Sayandev Mukherjee, Furuzan Atay Onat
GLOBECOM
2009
IEEE
13 years 11 months ago
A Mobicast Routing Protocol in Vehicular Ad-Hoc Networks
In this paper, we present a spatiotemporal multicast , called a mobicast, protocol for supporting applications which require spatiotemporal coordination in VANETs. The spatiotempor...
Yuh-Shyan Chen, Yun-Wei Lin, Sing-Ling Lee
ESAS
2004
Springer
13 years 11 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...