Sciweavers

688 search results - page 100 / 138
» Fisheye State Routing in Mobile Ad Hoc Networks
Sort
View
MOBIHOC
2003
ACM
14 years 7 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
ICWN
2009
13 years 5 months ago
Efficient Medium Access Control with IEEE 802.11 for Mobile Ad Hoc Networks
The IEEE 802.11 Medium Access Control (MAC) protocol has inherent weakness of channel wastage while operating a Mobile Ad hoc Network (MANET). In this paper, we therefore propose s...
Zalal Uddin Mohammad Abusina, Mesbah Uddin, Salahu...
ICDCS
2006
IEEE
14 years 1 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
CEE
2010
86views more  CEE 2010»
13 years 7 months ago
Scalability of MANET routing protocols for heterogeneous and homogenous networks
In Mobile Ad hoc Network (MANET), mobility, traffic and node density are main network conditions that significantly affect the performance of routing protocols. Much of the previou...
Huda AlAmri, Mehran Abolhasan, Tadeusz A. Wysocki
ICSE
2001
IEEE-ACM
14 years 4 days ago
Consistent Group Membership in Ad Hoc Networks
The design of ad hoc mobile applications often requires the availability of a consistent view of the application state among the participating hosts. Such views are important beca...
Gruia-Catalin Roman, Qingfeng Huang, Ali Hazemi