Sciweavers

1382 search results - page 28 / 277
» Detecting Node Misbehavior in Ad hoc Networks
Sort
View
GLOBECOM
2008
IEEE
15 years 4 months ago
Influence of Node Location Distributions on the Structure of Ad Hoc and Mesh Networks
We study the impact of the distribution of node locations on key properties of wireless networks. In particular, using Monte Carlo simulations we study in detail the behavior of av...
Janne Riihijärvi, Marina Petrova, Petri M&aum...
HICSS
2003
IEEE
108views Biometrics» more  HICSS 2003»
15 years 9 months ago
Border Node Retransmission Based Probabilistic Broadcast Protocols in Ad-Hoc Networks
In this paper, we propose some improvements to the flooding protocols that aim to efficiently broadcast a given information through the whole ad-hoc network. These improvements ...
Julien Cartigny, David Simplot
ICWN
2009
15 years 2 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 4 months ago
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters...
Joseph Blomer, Nihar Jindal
MONET
2002
162views more  MONET 2002»
15 years 4 months ago
AMRoute: Ad Hoc Multicast Routing Protocol
The Ad hoc Multicast Routing protocol (AMRoute) presents a novel approach for robust IP Multicast in mobile ad hoc networks by exploiting user-multicast trees and dynamic logical c...
Jason Xie, Rajesh R. Talpade, Anthony McAuley, Min...