Sciweavers

662 search results - page 59 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
ICOIN
2005
Springer
14 years 2 months ago
On the Hidden Terminal Problem in Multi-rate Ad Hoc Wireless Networks
Multi-hop ad hoc wireless networks generally use the IEEE 802.11 Distributed Coordination Function (DCF) MAC protocol, which utilizes the request-to-send/clear-to-send (RTS/CTS) me...
Joon Yoo, Chongkwon Kim
AINA
2008
IEEE
14 years 3 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
IFIP8
2004
13 years 10 months ago
Using Group Management to Tame Mobile Ad Hoc Networks
Mobile ad hoc networks (MANET) offer a convenient basis towards pervasive computing, due to inherent support for anytime, anywhere network access for mobile users. However, the dev...
Malika Boulkenafed, Daniele Sacchetti, Valé...
ADHOC
2010
135views more  ADHOC 2010»
13 years 3 months ago
Efficient broadcast for wireless ad hoc networks with a realistic physical layer
In this paper, we investigate the low coverage problem of efficient broadcast protocols in wireless ad hoc networks with realistic physical layer models. To minimize energy consum...
Hui Xu, J. J. Garcia-Luna-Aceves
INFOCOM
2006
IEEE
14 years 2 months ago
Impact of Mobility on the Performance of Relaying in Ad Hoc Networks
— We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly diffe...
Ahmad Al Hanbali, Arzad Alam Kherani, Robin Groene...