Sciweavers

605 search results - page 35 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
MOBIHOC
2002
ACM
14 years 7 months ago
Weak duplicate address detection in mobile ad hoc networks
Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirabl...
Nitin H. Vaidya
ICC
2000
IEEE
376views Communications» more  ICC 2000»
13 years 12 months ago
TCP-Bus: Improving TCP Performance in Wireless Ad-Hoc Networks
Abstract: Reliable data transmission over wireless multi-hop networks, called ad hoc networks, has proven to be non-trivial. TCP (Transmission Control Protocol), a widely used end-...
Dongkyun Kim, Chai-Keong Toh, Yanghee Choi
JNCA
2008
154views more  JNCA 2008»
13 years 7 months ago
Novel route maintenance protocols for the Bluetooth ad hoc network with mobility
Bluetooth technology is specially designed for the wireless personal area networks to replace cable. Several challenges exist in Bluetooth scatternet formation and routing, since ...
Prasan Kumar Sahoo, Chih-Yung Chang, Sheng-Wen Cha...
ICCSA
2004
Springer
14 years 28 days ago
A Cluster Based Hierarchical Routing Protocol for Mobile Networks
We propose a hierarchical, cluster based semi-distributed routing protocol for a mobile ad hoc network. The network graph is partitioned into clusters using heuristics and the shor...
Kayhan Erciyes, Geoffrey Marshall
WMCSA
2003
IEEE
14 years 25 days ago
Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture
Few real-world applications of mobile ad hoc networks have been developed or deployed outside the military environment, and no traces of actual node movement in a real ad hoc netw...
Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalCha...