Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
— In this paper we study a simple protocol utilizing two-hop cooperative diversity augmented with “automatic repeat request” (ARQ) for multi-hop ad-hoc networks. This protoco...
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters...
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
In this paper, we present an intelligent and controllable ad hoc network using mobile robot routers in heterogeneous mobile environments. The goal of the mobile robots is to ensur...
Rabah Meraihi, Gwendal Le Grand, Samir Tohmé...