Sciweavers

605 search results - page 26 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
ICC
2007
IEEE
205views Communications» more  ICC 2007»
14 years 1 months ago
RLAR: Robust Link Availability Routing Protocol for Mobile Ad Hoc Networks
— Many previously proposed routing metrics and algorithms for ad hoc networks work well in static networks, however, when nodes are moving and wireless links may fail from time t...
Xueyuan Su, Sammy Chan, King Sun Chan
PDPTA
2004
13 years 9 months ago
A New Adaptive Distributed Routing Protocol Using d-hop Dominating Sets for Mobile Ad Hoc Networks
In this paper, we propose an adaptive self- stabilizing algorithm for producing a d-hop connected d-hop dominating set. In the algorithm, the set is cumulatively built with commun...
Zhengnan Shi, Pradip K. Srimani
SAINT
2003
IEEE
14 years 24 days ago
Secure Link State Routing for Mobile Ad Hoc Networks
The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, securit...
Panagiotis Papadimitratos, Zygmunt J. Haas
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 7 months ago
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network
In this paper optimization of DSR is achieved using New Link Cache structure and Source Transparent Route Maintenance Method. The new link cache effectively utilizes the memory by ...
Chinnappan Jayakumar, Chenniappan Chellappan
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 7 months ago
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters...
Joseph Blomer, Nihar Jindal