Sciweavers

477 search results - page 40 / 96
» Information-Theoretic Bounds for Mobile Ad-hoc Networks Rout...
Sort
View
GLOBECOM
2006
IEEE
14 years 2 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
ICC
2000
IEEE
144views Communications» more  ICC 2000»
14 years 27 days ago
Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks
– This paper presents a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce rou...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen
MOBIHOC
2004
ACM
14 years 8 months ago
Using labeled paths for loop-free on-demand routing in ad hoc networks
We present the Feasible Label Routing (FLR) protocol for mobile ad hoc networks, which uses path information to establish routes to destinations on demand. FLR enables loopfree in...
Hari Rangarajan, J. J. Garcia-Luna-Aceves
JUCS
2008
138views more  JUCS 2008»
13 years 8 months ago
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
: A central characteristic of ad hoc mobile networks is the frequent changes of their topology. This is the source of many problems that need to be solved. AODV is an on-demand rou...
SungSoo Lee, HangKon Kim, ChongGun Kim
IFM
2005
Springer
14 years 2 months ago
Model-Based Prototyping of an Interoperability Protocol for Mobile Ad-Hoc Networks
Abstract. We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for t...
Lars Michael Kristensen, Michael Westergaard, Pede...