Sciweavers

415 search results - page 20 / 83
» Reactive routing overhead in networks with unreliable nodes
Sort
View
CCR
2002
99views more  CCR 2002»
13 years 8 months ago
Implementation experience with MANET routing protocols
This paper outlines our experience with the implementation and deployment of two MANET routing protocols on a five node, four hop, network. The work was prompted by the lack of pu...
Kwan Wu Chin, John Judge, Aidan Williams, Roger Ke...
CSREASAM
2006
13 years 10 months ago
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing
A mobile ad hoc network is a self-organizing network that relies on the cooperation of participating nodes in order to function properly. In this network, mobile users arrive withi...
Ebrahim Khosravi, Brandy Tyson
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 2 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
ICDCSW
2005
IEEE
14 years 2 months ago
On Optimal TTL Sequence-Based Route Discovery in MANETs
In on-demand multi-hop routing protocols for MANETs such as DSR and AODV, a fundamental requirement for peer-to-peer connectivity is to discover routes to a remote node via flood...
Dimitrios Koutsonikolas, Saumitra M. Das, Himabind...
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 8 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...