Sciweavers

372 search results - page 35 / 75
» How bad TCP can perform in mobile ad hoc networks
Sort
View
CIC
2006
184views Communications» more  CIC 2006»
13 years 9 months ago
A Data Replication Scheme based on Primary Copy for Ensuring Data Consistency in Mobile Ad hoc Networks
Abstract - A mobile ad hoc network (MANET) is a multihop wireless network capable of autonomous operations. Since MANET causes frequent network partitions, a data replication is co...
Aekyung Moon, Han Namgoong, Hyoungsun Kim, Hyun Ki...
ICCNMC
2005
Springer
14 years 1 months ago
A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...
MSWIM
2003
ACM
14 years 28 days ago
Simulation of large ad hoc networks
An ad hoc network is formed by wireless mobile nodes (hosts) that operate as terminals as well as routers in the network, without any centralized administration. Research in ad ho...
Valeriy Naoumov, Thomas R. Gross
WINET
2010
163views more  WINET 2010»
13 years 6 months ago
On supporting reliable QoS in multi-hop multi-rate mobile ad hoc networks
Due to complicated situations such as node/link interference and traffic load, quality of service support in multi-hop multi-rate ad hoc networks remains a challenging issue. Furt...
Ming Li, B. Prabhakaran
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 9 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu