Sciweavers

ICDCSW
2006
IEEE
14 years 5 months ago
A directional gossip protocol for path discovery in MANETs
In this paper we present a gossip based protocol for path discovery in Mobile Ad Hoc Networks (MANETs). While in the classical gossip algorithm each node forwards a packet with th...
Roberto Beraldi
GLOBECOM
2006
IEEE
14 years 5 months ago
Adaptive Multi-Copy Routing for Intermittently Connected Mobile Ad Hoc Networks
— Intermittently Connected Mobile Ad Hoc Networks (ICMANs) are mobile networks in which complete source-todestination paths do not exist most of the time because of their sparse ...
Zhuoqun Li, Lingfen Sun, Emmanuel C. Ifeachor
GLOBECOM
2006
IEEE
14 years 5 months ago
Position-based Routing using Virtual Small World in MANETs
— Routing is the foremost issue in mobile ad hoc networks (MANETs), In a wireless environment characterized by small bandwidth and limited computation resources, positionbased ro...
Cong Liu, Jie Wu
GLOBECOM
2006
IEEE
14 years 5 months ago
The Head-of-Line Blocking Problem on Exposed Terminals in MANETs
— In Mobile Ad Hoc Networks (MANETs), the hidden and the exposed terminal problems affect the throughput of the Medium Access Control (MAC) protocols. Several MAC schemes have be...
Jing Deng, Yi Qian
GLOBECOM
2006
IEEE
14 years 5 months ago
A Distributed Size-bounded Multi-hop Clustering for Mobile Ad Hoc Networks
— During the last few years there has been a rapid development in mobile ad hoc networks (MANETs). To make the operations of a MANET more efficient, one approach is to construct...
Yong Wang, Muralidhar Medidi
GLOBECOM
2006
IEEE
14 years 5 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
BROADNETS
2006
IEEE
14 years 5 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
AICT
2006
IEEE
135views Communications» more  AICT 2006»
14 years 5 months ago
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks
The inherent freedom due to a lack of central authority in self-organized mobile ad hoc networks introduces challenges for security and trust management. Arguably, trust managemen...
Reijo Savola, Ilkka Uusitalo
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
14 years 5 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
WISTP
2007
Springer
14 years 5 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette