Sciweavers

271 search results - page 14 / 55
» Robust Routing in Malicious Environment for Ad Hoc Networks
Sort
View
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hen...
Vincent Lenders, Martin May, Bernhard Plattner
VTC
2008
IEEE
165views Communications» more  VTC 2008»
14 years 2 months ago
Operation and Performance of Vehicular Ad-Hoc Routing Protocols in Realistic Environments
—Vehicle-to-vehicle and vehicle-to-infrastructure wireless communications are currently under development to improve traffic efficiency and safety. Routing protocols enabling mul...
Ramon Bauza, Javier Gozálvez, Miguel Sepulc...
ICWN
2004
13 years 9 months ago
Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...
Souheila Bouam, Jalel Ben-Othman
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 2 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
WOWMOM
2005
ACM
195views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks
The vast majority of mobile ad hoc networking research makes a very large assumption: that communication can only take place between nodes that are simultaneously accessible withi...
Mirco Musolesi, Stephen Hailes, Cecilia Mascolo