Sciweavers

JNSM
2002
218views more  JNSM 2002»
13 years 11 months ago
An Agent-based Connection Management Protocol for Ad Hoc Wireless Networks
Realizing high volume of data transmission in real time communication in a highly dynamic architecture like Mobile Ad hoc Networks (MANET) still remains a major point of research....
Romit Roy Choudhury, Krishna Paul, Somprakash Band...
ADHOC
2007
134views more  ADHOC 2007»
13 years 11 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
CROSSROADS
2004
108views more  CROSSROADS 2004»
13 years 11 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
COMCOM
2004
153views more  COMCOM 2004»
13 years 11 months ago
BLR: beacon-less routing algorithm for mobile ad hoc networks
Routing of packets in mobile ad hoc networks with a large number of nodes or with high mobility is a very difficult task and current routing protocols do not really scale well wit...
Marc Heissenbüttel, Torsten Braun, Thomas Ber...
WICOMM
2008
139views more  WICOMM 2008»
13 years 11 months ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
TPDS
2008
231views more  TPDS 2008»
13 years 11 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
TON
2008
204views more  TON 2008»
13 years 11 months ago
BRA: a bidirectional routing abstraction for asymmetric mobile ad hoc networks
idirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks Venugopalan Ramasubramanian and Daniel Moss
Venugopalan Ramasubramanian, Daniel Mossé
TMC
2008
138views more  TMC 2008»
13 years 11 months ago
A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Networks
Content-based routing (CBR) provides a powerful and flexible foundation for distributed applications. Its communication model, based on implicit addressing, fosters decoupling amon...
Luca Mottola, Gianpaolo Cugola, Gian Pietro Picco
ASE
2005
96views more  ASE 2005»
13 years 11 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
SIGMOBILE
2008
73views more  SIGMOBILE 2008»
13 years 11 months ago
Alert propagation in mobile ad hoc networks
bstract: Alert Propagation in Mobile Ad Hoc Networks Wenbo He Ying Huang Klara Nahrstedt Whay C. Lee Department of Computer Science Motorola Labs 201 N. Goodwin Avenue 111 Locke Dr...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...