Sciweavers

1395 search results - page 49 / 279
» Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Netw...
Sort
View
GLOBECOM
2006
IEEE
14 years 3 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
VTC
2006
IEEE
14 years 3 months ago
On Link Reliability in Wireless Mobile Ad Hoc Networks
— In mobile ad hoc networks (MANETs), packets are forwarded by a series of nodes to the desired destination. Previously, we have studied the network connectivity of MANETs. In th...
Juki Wirawan Tantra, Chuan Heng Foh, Dongyu Qiu
ICDCSW
2000
IEEE
14 years 1 months ago
Fisheye State Routing in Mobile Ad Hoc Networks
In this paper, we present a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce ...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen
ICC
2007
IEEE
157views Communications» more  ICC 2007»
13 years 10 months ago
On the Effectiveness of the 2-hop Routing Strategy in Mobile Ad Hoc Networks
— In this paper, we study the performance of the 2-hop routing scheme proposed for ad hoc wireless networks with mobile nodes, considering realistic node mobility patterns. First...
Michele Garetto, Paolo Giaccone, Emilio Leonardi