Sciweavers

269 search results - page 16 / 54
» Simulation Validation Using Direct Execution of Wireless Ad-...
Sort
View
MOBIHOC
2001
ACM
14 years 8 months ago
Implicit source routes for on-demand ad hoc network routing
In an ad hoc network, the use of source routing has many advantages, including simplicity, correctness, and flexibility. For example, all routing decisions for a packet are made b...
Yih-Chun Hu, David B. Johnson
IJSNET
2007
91views more  IJSNET 2007»
13 years 8 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
INFOCOM
2008
IEEE
14 years 3 months ago
Design and Evaluation of a Routing-Informed Cooperative MAC Protocol for Ad Hoc Networks
—Cooperative relaying has been shown to provide diversity gains which can significantly improve the Packet Error Rate (PER) in wireless transmissions. In ad hoc wireless routing...
Hermann S. Lichte, Stefan Valentin, Holger Karl, I...
EUC
2006
Springer
14 years 8 days ago
A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks
In mobile ad hoc networks, mobile devices wander autonomously for the use of wireless links and dynamically varying network topology. AODV (Ad-hoc on-demand Distance vector routing...
Chonggun Kim, Elmurod Talipov, Byoungchul Ahn
MSWIM
2006
ACM
14 years 2 months ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi