Sciweavers

297 search results - page 16 / 60
» Proposal and evaluation of an application level caching sche...
Sort
View
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
14 years 1 months ago
Analyzing a human-based trust model for mobile ad hoc networks
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
SECPERU
2006
IEEE
14 years 1 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
ICDCSW
2005
IEEE
14 years 1 months ago
Directional NAV Indicators and Orthogonal Routing for Smart Antenna Based Ad Hoc Networks
Smart antennas are expected to enhance scalability in ad hoc networks. This paper at first evaluates three directional MAC protocols, DMAC, MMAC and SWAMP as well as the omni-dir...
Masanori Sekido, Masanori Takata, Masaki Bandai, T...
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
ADHOC
2006
115views more  ADHOC 2006»
13 years 7 months ago
Routing characteristics of ad hoc networks with unidirectional links
Unidirectional links in an ad hoc network can result from factors such as heterogeneity of receiver and transmitter hardware, power control or topology control algorithms, or diff...
Jorjeta G. Jetcheva, David B. Johnson