Sciweavers

420 search results - page 11 / 84
» Rushing attacks and defense in wireless ad hoc network routi...
Sort
View
INFOCOM
2003
IEEE
14 years 27 days ago
Energy Efficient Routing in Ad Hoc Disaster Recovery Networks
—The terrorist attacks on September 11, 2001 have drawn attention to the use of wireless technology in order to locate survivors of structural collapse. We propose to construct a...
Gil Zussman, Adrian Segall
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 7 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
WWIC
2004
Springer
103views Communications» more  WWIC 2004»
14 years 29 days ago
Implementing Ad Hoc to Terrestrial Network Gateways
In this paper we describe our experience of implementing a gateway between ad hoc and terrestrial routing protocols. Our implementation of the gateway includes support for both a u...
Jonathan McGee, Manish Karir, John S. Baras
ICCCN
1998
IEEE
13 years 12 months ago
Comparative Performance Evaluation of Routing Protocols for Mobile, Ad hoc
We evaluate several routing protocols for mobile, wireless, ad hoc networks via packet level simulations. The protocol suite includes routing protocols specifically designed for a...
Samir Ranjan Das, Robert Castañeda, Jiangta...
MOBICOM
1999
ACM
13 years 12 months ago
Query Localization Techniques for On-Demand Routing Protocols in ad hoc Networks
Mobile ad hoc networks are characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Design of efficient routing protocols in ...
Robert Castañeda, Samir Ranjan Das