Sciweavers

1540 search results - page 30 / 308
» Self-Configuring and Optimizing Mobile Ad Hoc Networks
Sort
View
JDCTA
2010
179views more  JDCTA 2010»
13 years 3 months ago
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Routing protocol is a pivotal issue in Mobile Ad Hoc Networks (MANETs). Several routing protocols have been proposed to deal with the routing issue in MANETs. However, routing tur...
Taifei Zhao, Xizheng Ke, Peilin Yang
JNCA
2011
281views more  JNCA 2011»
12 years 12 months ago
A link stability-based multicast routing protocol for wireless mobile ad hoc networks
  Recently, several studies have been conducted to design mobility‐based multicast routing protocols for    wireless mobile ad hoc networks (MANET). These ...
Javad Akbari Torkestani, Mohammad Reza Meybodi
TIFS
2010
130views more  TIFS 2010»
13 years 3 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
ISCAPDCS
2003
13 years 10 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
ICDCS
2011
IEEE
12 years 8 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang