Sciweavers

271 search results - page 19 / 55
» Robust Routing in Malicious Environment for Ad Hoc Networks
Sort
View
ICDCSW
2005
IEEE
14 years 1 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
SIMUTOOLS
2008
13 years 9 months ago
A simulation model of DYMO for ad hoc routing in OMNeT++
Mobile Ad Hoc Networks (MANETs) have evolved in the last years into standards in the communication world. By definition, they do not need any network infrastructure to facilitate ...
Christoph Sommer, Isabel Dietrich, Falko Dressler
ADHOC
2006
115views more  ADHOC 2006»
13 years 7 months ago
Routing characteristics of ad hoc networks with unidirectional links
Unidirectional links in an ad hoc network can result from factors such as heterogeneity of receiver and transmitter hardware, power control or topology control algorithms, or diff...
Jorjeta G. Jetcheva, David B. Johnson
VTC
2006
IEEE
179views Communications» more  VTC 2006»
14 years 1 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu
WIMOB
2007
IEEE
14 years 2 months ago
A Fault Resilient Routing Protocol for Mobile Ad-Hoc Networks
— In a Mobile Ad hoc NETwork (MANET), mobile devices cooperate to forward packets for each other without the assistance of dedicated routing infrastructures. Due to its networkin...
Sirisha Medidi, Jiong Wang