Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
Mobile agent frameworks have attracted a lot of attention in recent years, seen as counterparts of static distributed object frameworks but allowing also for object or agent mobil...
Christos Bohoris, George Pavlou, Haitham S. Cruick...
Mobile Ad Hoc Networks (MANET) performance is affected by a number of factors, eg. speed, node density. In this paper we will focus on the effect of constrained mobility on the per...
Bu-Sung Lee, Kai Juan Wong, Boon-Chong Seet, Lijua...
In this study we investigate the interaction between TCP and MAC layer in a wireless multi-hop network. Using simulation, we provide new insight into two critical problems of TCP ...
— In order to support mobile users, the basic Internet protocols have been extended with protocols (e.g., Mobile IPv6) for intercepting and forwarding packets to a mobile and pos...
Johnny Lai, Y. Ahmet Sekercioglu, Norbert Jordan, ...