Sciweavers

929 search results - page 10 / 186
» Modeling and Verifying Ad Hoc Routing Protocols
Sort
View
COMCOM
2002
185views more  COMCOM 2002»
13 years 7 months ago
Infrastructure-based routing in wireless mobile ad hoc networks
In this paper, we propose a new protocol for wireless mobile ad hoc communications, which establishes a dynamic wireless mobile infrastructure to mimic and maintain the operation ...
Ahmed M. Safwat, Hossam S. Hassanein
MSWIM
2005
ACM
14 years 1 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
TMC
2008
125views more  TMC 2008»
13 years 7 months ago
Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks
A k-hop dominating set is a subset of nodes such that each node not in the set can be reached within k hops from at least one node in the set. A connected k-hop dominating set can ...
Hong-Yen Yang, Chia-Hung Lin, Ming-Jer Tsai
ADHOC
2004
118views more  ADHOC 2004»
13 years 7 months ago
A review of routing protocols for mobile ad hoc networks
The 1990s have seen a rapid growth of research interests in mobile ad hoc networking. The infrastructureless and the dynamic nature of these networks demands new set of networking...
Mehran Abolhasan, Tadeusz A. Wysocki, Eryk Dutkiew...
CCS
2008
ACM
13 years 9 months ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...