Sciweavers

1190 search results - page 26 / 238
» Simulation of large ad hoc networks
Sort
View
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 10 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
AINA
2007
IEEE
14 years 2 months ago
Reference Path Ad Hoc Routing Mechanism
The purpose of this work is to present the Reference Path Ad hoc Routing (REPAR) mechanism, which has been designed to optimize the performance of reactive ad hoc routing protocol...
Fabricio L. Figueiredo, Paulo Cardieri, Marcel C. ...
AINA
2007
IEEE
14 years 2 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
MOBICOM
2006
ACM
14 years 2 months ago
Impact of radio propagation models in vehicular ad hoc networks simulations
Dominique Dhoutaut, Anthony Régis, Fran&cce...
SAJ
2002
127views more  SAJ 2002»
13 years 8 months ago
Limited flooding protocol for mobile ad hoc networks
Mobile ad hoc networks are collections of mobile nodes without any fixed infrastructure or central co-ordinating mechanism for packet routing. Consequently, routing is a challenge...
Mieso K. Denko, W. Goddard