Sciweavers

1395 search results - page 82 / 279
» Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Netw...
Sort
View
ICWN
2003
13 years 10 months ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 3 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
ICOIN
2001
Springer
14 years 1 months ago
SOM: Spiral-Fat-Tree-Based On-Demand Multicast Protocol in a Wireless Ad-Hoc Network
A mobile ad-hoc network (MANET) is a characteristized by multi-hop wireless links, in the absence of any cellular infrastructure, as well as frequent host mobility. Existing on-de...
Yuh-Shyan Chen, Tzung-Shi Chen, Ching-Jang Huang
ENTCS
2006
173views more  ENTCS 2006»
13 years 9 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
ACMSE
2006
ACM
14 years 3 months ago
Mobility models for vehicular ad hoc network simulations
: There is a growing interest in deployment and evaluation of routing protocols for Vehicular Ad-Hoc Wireless Networks (VANETs) in urban contexts. The mobility model of nodes is on...
Niranjan Potnis, Atulya Mahajan