Sciweavers

605 search results - page 51 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
ICC
2009
IEEE
158views Communications» more  ICC 2009»
14 years 3 months ago
An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms
—Routing in ad-hoc networks can consume considerable amount of battery power. However, as the nodes in these networks have limited power, routing is very much energy-constrained....
Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. ...
ETFA
2005
IEEE
14 years 2 months ago
ZRP versus DSR and TORA: a comprehensive survey on ZRP performance
Ad hoc networks are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and channel non-deterministic behavior (interference, multipath, hidd...
Spilios Giannoulis, Christos D. Antonopoulos, Evan...
ICT
2004
Springer
147views Communications» more  ICT 2004»
14 years 2 months ago
A Heuristic Approach to Energy Saving in Ad Hoc Networks
This paper presents a new algorithm, Extra, for extending the lifetime of ad hoc networks. Extra tries to conserve energy by identifying and switching off nodes that are momentaril...
R. I. da Silva, Julius C. B. Leite, M. P. Fernande...
GLOBECOM
2006
IEEE
14 years 2 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
ICNP
2005
IEEE
14 years 2 months ago
Efficient Hop ID based Routing for Sparse Ad Hoc Networks
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu