Sciweavers

225 search results - page 8 / 45
» Inherent Security of Routing Protocols in Ad-Hoc and Sensor ...
Sort
View
IFIP
2004
Springer
14 years 26 days ago
Ad Hoc Routing with Early Unidirectionality Detection and Avoidance
This paper is motivated by the observation that current research in ad hoc networks mostly assumes a physically flat network architecture with the nodes having homogeneous charact...
Young-Bae Ko, Sung-Ju Lee, Jun-Beom Lee
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 7 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
PEWASUN
2004
ACM
14 years 28 days ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...
CSFW
2010
IEEE
13 years 11 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
CSE
2009
IEEE
14 years 6 days ago
A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor Networks
— this paper proposes a distributed routing protocol for ad hoc sensor networks which uses Fuzzy Logic. Each sensor uses a Fuzzy decision making process to find the best Cluster ...
Shahram Nourizadeh, Yeqiong Song, Jean-Pierre Thom...