Sciweavers

465 search results - page 52 / 93
» Resilience to Dropping Nodes in Mobile Ad Hoc Networks with ...
Sort
View
CROSSROADS
2004
108views more  CROSSROADS 2004»
13 years 7 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
COORDINATION
2007
Springer
14 years 1 months ago
A Calculus for Mobile Ad Hoc Networks
We suggest a Calculus for Mobile Ad Hoc Networks, CMAN. A node in a network is a processes equipped with a location, it may communicate with other nodes using synchronous local bro...
Jens Chr. Godskesen
IAJIT
2008
139views more  IAJIT 2008»
13 years 7 months ago
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
: Internet-based Mobile Ad Hoc Networking (MANET) is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in ...
Velmurugan Ayyadurai, Rajaram Ramasamy
PE
2007
Springer
175views Optimization» more  PE 2007»
13 years 7 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
JSAC
2006
114views more  JSAC 2006»
13 years 7 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu