This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
The Java Message Service (JMS) provides a standard asynchronous messaging API, which simplifies the construction of loosely coupled, distributed applications. This paper describes ...
Einar Vollset, David B. Ingham, Paul D. Ezhilchelv...
— Many previously proposed routing metrics and algorithms for ad hoc networks work well in static networks, however, when nodes are moving and wireless links may fail from time t...
Abstract—Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. We propose a rout...