Sciweavers

605 search results - page 86 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
ADHOCNOW
2005
Springer
14 years 2 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
WS
2006
ACM
14 years 2 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
BROADNETS
2004
IEEE
14 years 14 days ago
A Distributed Mobile Backbone Formation Algorithm for Wireless Ad Hoc Networks
In this paper, we present a novel fully distributed version of a Mobile Backbone Network Topology Synthesis Algorithm (MBN-TSA) for constructing and maintaining a dynamic backbone...
Laura Huei-jiun Ju, Izhak Rubin, Kevin Ni, Christo...
ECS
2006
89views more  ECS 2006»
13 years 8 months ago
Dynamic Decision Protocol For Adhoc Network
Several researches were conducted to Ad Hoc networks because of their facility of deployment, no need of an infrastructure and many other features. Thus, they still present many un...
Mohamed Ben Othman
UIC
2007
Springer
14 years 2 months ago
Mobility Tracking for Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), nodes mobility cause network topologies to change dynamically over time, which complicates important tasks such as broadcasting and routing. Mob...
Hui Xu, Min Meng, Jinsung Cho, Brian J. d'Auriol, ...