Sciweavers

542 search results - page 56 / 109
» Novel route maintenance protocols for the Bluetooth ad hoc n...
Sort
View
CROSSROADS
2004
108views more  CROSSROADS 2004»
13 years 8 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
EUSAI
2003
Springer
14 years 1 months ago
Real Time Application Support in an Ambient Network Using Intelligent Mobile Robots
In this paper, we present an intelligent and controllable ad hoc network using mobile robot routers in heterogeneous mobile environments. The goal of the mobile robots is to ensur...
Rabah Meraihi, Gwendal Le Grand, Samir Tohmé...
IWCMC
2006
ACM
14 years 2 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
ICC
2009
IEEE
136views Communications» more  ICC 2009»
14 years 3 months ago
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks
—The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally p...
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku
ICCCN
2007
IEEE
14 years 3 months ago
Evaluating Mobile Ad Hoc Networks: A Performance Index and Statistical Model
Abstract— This work is concerned with definining a performance index that can be used as an objective measure in the evaluation and comparison of ad hoc networking protocols. Sp...
Ikhlas Ajbar, Dmitri D. Perkins