Sciweavers

2634 search results - page 132 / 527
» Infrastructured Ad Hoc Networks
Sort
View
ESAS
2005
Springer
15 years 9 months ago
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
Gergely Ács, Levente Buttyán, Istv&a...
ICT
2004
Springer
147views Communications» more  ICT 2004»
15 years 9 months ago
A Heuristic Approach to Energy Saving in Ad Hoc Networks
This paper presents a new algorithm, Extra, for extending the lifetime of ad hoc networks. Extra tries to conserve energy by identifying and switching off nodes that are momentaril...
R. I. da Silva, Julius C. B. Leite, M. P. Fernande...
ENGL
2006
70views more  ENGL 2006»
15 years 4 months ago
Strategies for Service Discovery over Ad Hoc Networks
Service discovery is an important and necessary component of ad hoc networks. To fit within the context of such networks, a post-query model with several service discovery strateg...
Michel Barbeau, Evangelos Kranakis, Honghui Luo
155
Voted
IJWIN
2002
166views more  IJWIN 2002»
15 years 3 months ago
QoS Routing for Mesh-Based Wireless LANs
Wireless LANs with their increased data rate become an attractive technology for connecting mobile users to the Internet. Efficient deployment of wireless LANs will require the ab...
Qi Xue, Aura Ganz
ICDCSW
2003
IEEE
15 years 9 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...