Sciweavers

605 search results - page 44 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
MOBIHOC
2001
ACM
14 years 7 months ago
Implicit source routes for on-demand ad hoc network routing
In an ad hoc network, the use of source routing has many advantages, including simplicity, correctness, and flexibility. For example, all routing decisions for a packet are made b...
Yih-Chun Hu, David B. Johnson
MONET
2007
160views more  MONET 2007»
13 years 7 months ago
Joint Design of Routing and Medium Access Control for Hybrid Mobile Ad Hoc Networks
Efficient routing and medium access control (MAC) are very important for Mobile Ad hoc Networks (MANETs). Most existing routing and MAC protocols consider homogeneous ad hoc networ...
Xiaojiang Du, Dapeng Wu
EUC
2006
Springer
13 years 11 months ago
A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks
In mobile ad hoc networks, mobile devices wander autonomously for the use of wireless links and dynamically varying network topology. AODV (Ad-hoc on-demand Distance vector routing...
Chonggun Kim, Elmurod Talipov, Byoungchul Ahn
INFOCOM
2002
IEEE
14 years 16 days ago
Gossip-based ad hoc routing
— Many ad hoc routing protocols are based on (some variant of) flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossipin...
Zygmunt J. Haas, Joseph Y. Halpern, Erran L. Li
ICC
2000
IEEE
144views Communications» more  ICC 2000»
14 years 16 hour ago
Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks
– This paper presents a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce rou...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen