Several previous works have shown that TCP exhibits poor performance in Mobile Ad Hoc Networks (MANETs). The ultimate reason for this is that MANETs behave in a significantly diff...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
Multicast applications for large-scale Mobile Ad hoc NETworks (MANETs) require an efficient and effective Quality of Service (QoS)-aware multicast model. The new requirements to ...
Guojun Wang, Jiannong Cao, Lifan Zhang, Keith C. C...
Localization is a fundamental operation in mobile and self-configuring networks such as sensor networks and mobile ad hoc networks. For example, sensor location is often critical...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
Point-to-point transmissions represent a fundamental primitive in any communication network. Despite many proave appeared in the literature, providing an efficient implementation ...
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Mobile ad hoc networks (MANETs) are a very promising next generation networks. Prediction is an essential aspect in the deployment of MANETs. Current work mainly focuses on mobili...
Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the...
We present the design and implementation of a working system that enables self-configuration and self-optimization in mobile ad hoc networks (MANETs) by exploiting context awarene...
Apostolos Malatras, George Pavlou, Stylianos Gouve...
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...