Sciweavers

2634 search results - page 181 / 527
» Infrastructured Ad Hoc Networks
Sort
View
VTC
2008
IEEE
147views Communications» more  VTC 2008»
15 years 11 months ago
Media Access Technique for Cluster-Based Vehicular Ad Hoc Networks
— We propose a hybrid media access technique for cluster-based vehicular networks. This technique integrates the centralization approach of cluster management and the universal w...
Zaydoun Y. Rawashdeh, Syed Masud Mahmud
178
Voted
GLOBECOM
2006
IEEE
15 years 10 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
INFOCOM
2002
IEEE
15 years 9 months ago
QoS routing for mobile ad hoc networks
Abstract—A Quality-of-Service (QoS) routing protocol is developed for mobile ad hoc networks. It can establish QoS routes with reserved bandwidth on a per flow basis in a networ...
Chenxi Zhu, M. Scott Corson
147
Voted
ICWN
2003
15 years 5 months ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...
INFOCOM
2010
IEEE
15 years 3 months ago
Impact of Correlated Mobility on Delay-Throughput Performance in Mobile Ad-Hoc Networks
—We extend the analysis of the scaling laws of wireless ad hoc networks to the case of correlated nodes movements, which are commonly found in real mobility processes. We conside...
Delia Ciullo, Valentina Martina, Michele Garetto, ...