Results 1 - 10
of
24,165
Table 4. Key management schemes for mobile ad hoc networks.
in Abstract
"... In PAGE 31: ... By fabricating and forwarding route error messages an attacker can try to disrupt the operation of existing routes, not only breaking connectivity but also creating additional routing overhead in the network as a result of legitimate nodes trying to establish alternative paths. In Table4 we present the route maintenance characteristics of the protocols we have analyzed. The solution adopted by most of the analyzed protocols requires the signing of the complete error message by the node that generates or forwards it.... In PAGE 33: ... In this section we will present several key management solutions that have been specifically proposed to address the challenges of mobile ad hoc networks and discuss their behavior in respect to mobility patterns and operational requirements. Table4 summarizes the results of our analysis. Table 4.... ..."
Table 2 summarises characteristics of the five service discovery protocols presented above. Their suitability for mobile ad-hoc networks will be discussed subsequently.
2003
"... In PAGE 10: ... Table2... ..."
Table 1: Possible characteristics of simulation environments for mobile ad hoc networks and their common implementation. These characteristics are considered in Section 6 to score the different network simulators.
Cited by 3
Table 3. Comparison of multicast routing protocols for mobile ad hoc netowrks
2005
"... In PAGE 31: ... Table3 gives comparison of typical multicast routing protocols for mobile ad hoc networks. Metrics used for comparison are the multicast delivery structure, how to acquire and maintain routing information, whether they are loop-free, the dependency on underlying unicast routing protocol, is the control packet flooding being used, the requirement for periodic control messages, the routing hierarchy and their scalability.... ..."
Table 1 Sample Trace Data for Ad-Hoc Routing Distance Velocity PCR PCH ...
"... In PAGE 9: ...f mobile networks (i.e., the number of nodes/routes is not xed). Table1 shows some ctional trace data for a node. During the \training quot; process, where a diversity of normal situations are simulated, the trace data is gath- ered for each node.... ..."
TABLE I Uniform capacity of the five node ad-hoc network.
2003
Cited by 107
TABLE VI CONTROL TRAFFIC OVERHEAD IN AD-HOC NETWORK PROTOCOLS.
2002
Cited by 2
TABLE VI MULTI-HOP AD-HOC NETWORK MODEL
Table 1: Classi cation of mobile hosts by parameters Quite often, low-mobility environments are associated with high bandwidths and high- mobility environments with relatively lower bandwidths [16]. Therefore, in our architecture, Super-MHs are assumed to have lower mobility than Mini-MHs. As a matter of fact, it is expected that a layer of hierarchy in ad-hoc network architecture can be subdivided if we consider more parameters that a ect the classi cation of mobile hosts apos; types. This is an area for further research.
1997
"... In PAGE 3: ... However, mobile hosts participating in real ad-hoc networks may be classi ed by some parameters, such as transmit capacity and moving speed. Table1 shows one way to classify mobile hosts into Mini- and Super- mobile hosts. A Super-Mobile Host (Super-MH) refers to a mobile host having large transmission power level, whereas a Mini-Mobile Host (Mini-MH) refers to one having relatively small transmission capacity.... ..."
Cited by 9
Table 1. Unicast routing protocols reviewed in this report
2005
"... In PAGE 9: ... Therefore, this report presents typical protocols selected from the class of similar approaches that can reflect the state-of-the-art of research work on mobile ad hoc network routing. Table1... ..."
Results 1 - 10
of
24,165