Sciweavers

605 search results - page 38 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
ADHOCNOW
2006
Springer
14 years 1 months ago
ROAR: A Multi-rate Opportunistic AODV Routing Protocol for Wireless Ad-Hoc Networks
In this paper, we outline a simple approach, called ROAR, that enables the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol to strengthen its routes by recruiting neighbors...
Kwan Wu Chin, Darryn Lowe
ICC
2000
IEEE
179views Communications» more  ICC 2000»
14 years 1 hour ago
A Comparison of On-Demand and Table Driven Routing for Ad-Hoc Wireless Networks
—We introduce WRP-Lite, which is a table-driven routing protocol that uses non-optimal routes, and compare its performance with the performance of the dynamic source routing (DSR...
Jyoti Raju, J. J. Garcia-Luna-Aceves
ICDCSW
2005
IEEE
14 years 1 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
WIMOB
2007
IEEE
14 years 1 months ago
A Fault Resilient Routing Protocol for Mobile Ad-Hoc Networks
— In a Mobile Ad hoc NETwork (MANET), mobile devices cooperate to forward packets for each other without the assistance of dedicated routing infrastructures. Due to its networkin...
Sirisha Medidi, Jiong Wang
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 15 days ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...