Sciweavers

MSWIM
2005
ACM
14 years 5 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
MOBICOM
2005
ACM
14 years 5 months ago
Assignment of dynamic transmission range based on estimation of vehicle density
Vehicular Ad Hoc Networks (VANET) have several characteristics that distinguish them from other ad hoc networks. Among those is the rapid change in topology due to traffic jams, w...
Maen M. Artimy, William Robertson, William J. Phil...
WONS
2005
IEEE
14 years 5 months ago
Broadcasting in Hybrid Ad Hoc Networks
In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multi-hop cellular a...
François Ingelrest, David Simplot-Ryl, Ivan...
QSHINE
2005
IEEE
14 years 5 months ago
Cooperative-Diversity Slotted ALOHA
We propose a cooperative-diversity technique for ad hoc networks based on the decode-and-forward relaying strategy. We develop a MAC protocol based on slotted ALOHA that allows ne...
Wing-Hin Wong, John M. Shea, Tan F. Wong
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 5 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
INFOCOM
2005
IEEE
14 years 5 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
IEEESCC
2005
IEEE
14 years 5 months ago
Context Aware Session Management for Services in Ad Hoc Networks
— The increasing ubiquity of wireless mobile devices is promoting unprecedented levels of electronic collaboration among devices interoperating to achieve a common goal. Issues r...
Radu Handorean, Rohan Sen, Gregory Hackmann, Gruia...
ETFA
2005
IEEE
14 years 5 months ago
ZRP versus DSR and TORA: a comprehensive survey on ZRP performance
Ad hoc networks are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and channel non-deterministic behavior (interference, multipath, hidd...
Spilios Giannoulis, Christos D. Antonopoulos, Evan...
BROADNETS
2005
IEEE
14 years 5 months ago
Performance analysis and enhancement for backbone based wireless mobile ad hoc networks
—In this paper, we present an extended Mobile Backbone Network (MBN) topology synthesis algorithm (ETSA) for constructing and maintaining a dynamic backbone structure in mobile w...
Laura Huei-jiun Ju, Izhak Rubin
WS
2006
ACM
14 years 5 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla