Sciweavers

605 search results - page 47 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
JUCS
2007
164views more  JUCS 2007»
13 years 8 months ago
An Adaptive Hierarchical Extension of DSR: The Cluster Source Routing
: Numerous studies have shown the difficulty for a single routing protocol to scale with respect to mobility and network size in wireless ad hoc networks. This paper presents a clu...
Farid Jaddi, Béatrice Paillassa
ICCCN
2007
IEEE
14 years 3 months ago
Localized detection of k-connectivity in wireless ad hoc, actuator and sensor networks
- Ad hoc, actuator and sensor wireless networks normally have critical connectivity properties before becoming fault intolerant. Existing algorithms for testing k-connectivity are ...
Milenko Jorgic, Nishith Goel, Kalai Kalaichelvan, ...
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 3 months ago
Greedy Hop Distance Routing Using Tree Recovery on Wireless Ad Hoc and Sensor Networks
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
MOBICOM
2005
ACM
14 years 2 months ago
Experimental characterization of multi-hop communications in vehicular ad hoc network
This paper presents the performance measurement of TCP and UDP communication of a multi-hop Vehicular Ad Hoc Network (VANET) in highway and suburban areas. We use existing out-ofb...
Fay Hui, Prasant Mohapatra
TPDS
2008
231views more  TPDS 2008»
13 years 8 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino