Sciweavers

477 search results - page 14 / 96
» Information-Theoretic Bounds for Mobile Ad-hoc Networks Rout...
Sort
View
WCNC
2008
IEEE
14 years 3 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
PEWASUN
2004
ACM
14 years 2 months ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...
HASE
2007
IEEE
14 years 21 days ago
Development of Custom Selling System Using Ad Hoc Networks
Recently, many routing protocols and applications for mobile ad hoc networks have been proposed. However, most of them are tested through the simulation experiments, but are not d...
Masato Asada, Tomoyuki Ohta, Kenji Ishida, Yoshiak...
AINA
2008
IEEE
14 years 3 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
MONET
2007
160views more  MONET 2007»
13 years 8 months ago
Joint Design of Routing and Medium Access Control for Hybrid Mobile Ad Hoc Networks
Efficient routing and medium access control (MAC) are very important for Mobile Ad hoc Networks (MANETs). Most existing routing and MAC protocols consider homogeneous ad hoc networ...
Xiaojiang Du, Dapeng Wu