Sciweavers

516 search results - page 40 / 104
» The Pulse Protocol: Mobile Ad hoc Network Performance Evalua...
Sort
View
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 10 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
TPDS
2008
133views more  TPDS 2008»
13 years 9 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
ADHOCNOW
2005
Springer
14 years 2 months ago
Message Stability and Reliable Broadcasts in Mobile Ad-Hoc Networks
Abstract. Many to many reliable broadcast is useful while building distributed services like group membership and agreement in a MANET. Efforts in implementing reliable broadcast ...
Kulpreet Singh, Andronikos Nedos, Gregor Gärt...
JSAC
2006
136views more  JSAC 2006»
13 years 9 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
WOWMOM
2006
ACM
137views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
Evaluating Context Information Predictability for Autonomic Communication
Delay tolerant and mobile ad hoc networks, present considerable challenges to the development of protocols and systems. In particular, the challenge of being able to cope with the...
Mirco Musolesi, Cecilia Mascolo