Sciweavers

766 search results - page 71 / 154
» Securing Ad hoc Routing Protocols
Sort
View
MOBICOM
2006
ACM
15 years 10 months ago
On delivery guarantees of face and combined greedy-face routing in ad hoc and sensor networks
It was recently reported that all known face and combined greedy-face routing variants cannot guarantee message delivery in arbitrary undirected planar graphs. The purpose of this...
Hannes Frey, Ivan Stojmenovic
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 4 months ago
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters...
Joseph Blomer, Nihar Jindal
PERCOM
2009
ACM
16 years 5 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
INFOCOM
2007
IEEE
15 years 10 months ago
To Repair or Not To Repair: Helping Ad-hoc Routing Protocols to Distinguish Mobility from Congestion
Abstract—In this paper we consider the problem of distinguishing whether frame loss at the MAC layer has occurred due to mobility or congestion. Most ad hoc routing protocols mak...
Manoj Pandey, Roger Pack, Lei Wang, Qiuyi Duan, Da...
MOBIHOC
2005
ACM
16 years 4 months ago
Scalable location services for hierarchically organized mobile ad hoc networks
This paper proposes a location service to assist location-based routing protocols, realized through a novel Associativity-Based clustering protocol. The main goal of our scheme, w...
Siva Sivavakeesar, George Pavlou