— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
The availability of powerful personal computers and high bandwidth home connectivity is changing the way users cooperate and exchange information on the network. Peer to peer comp...
Mario Bisignano, Giuseppe Di Modica, Orazio Tomarc...
In this paper, we present a spatiotemporal multicast , called a mobicast, protocol for supporting applications which require spatiotemporal coordination in VANETs. The spatiotempor...
— Battery power is an important resource in ad hoc networks. It has been observed that in ad hoc networks, energy consumption does not reflect the communication activities in th...
In our previous work, we proposed few updated data dissemination methods to refresh old replicas efficiently in mobile ad hoc networks. These methods disseminate updated data item...