Sciweavers

395 search results - page 20 / 79
» Survivability Analysis of Ad Hoc Wireless Network Architectu...
Sort
View
PEWASUN
2004
ACM
14 years 5 days ago
An M/MMGI/1/K queuing model for IEEE 802.11 ad hoc networks
An M/MMGI/1/K queuing model is developed for the analysis of IEEE 802.11 DCF using RTS/CTS. Results are based on arbitrary contention conditions, namely, collision probabilities, ...
Mustafa Özdemir, A. Bruce McDonald
MOBICOM
2000
ACM
13 years 11 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
SASN
2005
ACM
14 years 9 days ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
WIOPT
2010
IEEE
13 years 5 months ago
Effect of limited topology knowledge on opportunistic forwarding in ad hoc wireless networks
—Opportunistic forwarding is a simple scheme for packet routing in ad hoc wireless networks such as duty cycling sensor networks in which reducing energy consumption is a princip...
Prithwish Basu, Saikat Guha
ENTCS
2006
173views more  ENTCS 2006»
13 years 6 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin