Sciweavers

1382 search results - page 60 / 277
» Detecting Node Misbehavior in Ad hoc Networks
Sort
View
LCN
2008
IEEE
15 years 11 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
INFOCOM
2003
IEEE
15 years 9 months ago
Broadcasting in Ad Hoc Networks Based on Self-Pruning
— We propose a general framework for broadcasting in ad hoc networks through self-pruning. The approach is based on selecting a small subset of hosts (also called nodes) to form ...
Jie Wu, Fei Dai
SIMUTOOLS
2008
15 years 6 months ago
A simulation model of DYMO for ad hoc routing in OMNeT++
Mobile Ad Hoc Networks (MANETs) have evolved in the last years into standards in the communication world. By definition, they do not need any network infrastructure to facilitate ...
Christoph Sommer, Isabel Dietrich, Falko Dressler
AINA
2010
IEEE
15 years 9 months ago
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks
—Conventional broadcasting protocols suffer from network congestion, frequent message losses and corruption of broadcast messages due to a vast number of duplicate packets transm...
Subrata Saha, Syed Rafiul Hussain, A. K. M. Ashiku...
BROADNETS
2006
IEEE
15 years 6 months ago
Multicasting in Energy Aware Mobile Backbone Based Wireless Ad Hoc Networks
Multicast protocols for MANET typically construct a tree or mesh structure for multicast message distribution. Typical implementations impose scalability and efficiency limitation...
Choo-Chin Tan, Izhak Rubin