Sciweavers

405 search results - page 18 / 81
» Evaluating Mobile Ad Hoc Networks: A Performance Index and S...
Sort
View
ICWN
2009
13 years 6 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
JNW
2006
82views more  JNW 2006»
13 years 8 months ago
Mobility Modeling in Mobile Ad Hoc Networks with Environment-Aware
Simulation is the most important and widely used method in the research of Mobile Ad hoc NETworks (MANET). The topology of MANET and the mobility of mobile nodes are the key factor...
Gang Lu, Gordon A. Manson, Demetrios Belis
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 10 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
WONS
2005
IEEE
14 years 2 months ago
Evaluation of Service Discovery Architectures for Mobile Ad Hoc Networks
Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). Different types of service discovery arch...
Paal Engelstad, Yan Zheng
PADS
2004
ACM
14 years 2 months ago
Detailed OFDM Modeling in Network Simulation of Mobile Ad Hoc Networks
In mobile ad hoc network (MANET) studies, it is imperative to use highly detailed device models as they provide high layer protocols with good prediction of underlying wireless co...
Gavin Yeung, Mineo Takai, Rajive Bagrodia, Alireza...