Results 1 - 10
of
40,625
Securing ad hoc networks
"... Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operation ..."
Abstract
-
Cited by 1064 (15 self)
- Add to MetaCart
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security
Distributed Clustering for Ad Hoc Networks
, 1999
"... A Distributed Clustering Algorithm (DCA) and a Distributed Mobility-Adaptive Clustering (DMAC) algorithm are presented that partition the nodes of a fully mobile network (ad hoc network) into clusters, thus giving the network a hierarchical organization. ..."
Abstract
-
Cited by 331 (6 self)
- Add to MetaCart
A Distributed Clustering Algorithm (DCA) and a Distributed Mobility-Adaptive Clustering (DMAC) algorithm are presented that partition the nodes of a fully mobile network (ad hoc network) into clusters, thus giving the network a hierarchical organization.
Power-Aware Routing in Mobile Ad Hoc Networks
, 1998
"... In this paper we present a case for using new power-aware metrics for determining routes in wireless ad hoc networks. We present five different metrics based on battery power consumption at nodes. We show that using these metrics in a shortest-cost routing algorithm reduces the cost/packet of rout ..."
Abstract
-
Cited by 775 (5 self)
- Add to MetaCart
In this paper we present a case for using new power-aware metrics for determining routes in wireless ad hoc networks. We present five different metrics based on battery power consumption at nodes. We show that using these metrics in a shortest-cost routing algorithm reduces the cost
Introduction to Ad Hoc Networking
"... This article introduces the ad hoc networking concept. It describes the background and basic idea of ad hoc networking. After a short introduction and history parts some ad hoc networking application examples and ..."
Abstract
- Add to MetaCart
This article introduces the ad hoc networking concept. It describes the background and basic idea of ad hoc networking. After a short introduction and history parts some ad hoc networking application examples and
A Secure Routing Protocol for Ad Hoc Networks
, 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract
-
Cited by 508 (0 self)
- Add to MetaCart
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments
Secure Routing for Mobile Ad Hoc Networks
- MOBILE COMPUTING AND COMMUNICATIONS REVIEW
, 2002
"... For such self-organizing infrastructures as mobile ad hoc
networks , envisioned to operate in an open, collaborative,
and highly volatile environment, the importance of secu-
rity cannot be underrated. The provision of comprehen-
sive secure communication mandates that both route dis-
covery and dat ..."
Abstract
-
Cited by 599 (14 self)
- Add to MetaCart
For such self-organizing infrastructures as mobile ad hoc
networks , envisioned to operate in an open, collaborative,
and highly volatile environment, the importance of secu-
rity cannot be underrated. The provision of comprehen-
sive secure communication mandates that both route dis-
covery
GPS-free positioning in mobile ad hoc networks
- Cluster Computing
, 2001
"... this paper, we describe an algorithm for the positioning of nodes in an ad hoc network that does not use GPS. The algorithm provides a position information to the nodes in the scenarios where an infrastructure does not exist and GPS cannot be used. GPS-free positioning is also desirable, when the GP ..."
Abstract
-
Cited by 462 (12 self)
- Add to MetaCart
this paper, we describe an algorithm for the positioning of nodes in an ad hoc network that does not use GPS. The algorithm provides a position information to the nodes in the scenarios where an infrastructure does not exist and GPS cannot be used. GPS-free positioning is also desirable, when
Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks
- MOBIHOC'02
, 2002
"... Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single meth ..."
Abstract
-
Cited by 519 (4 self)
- Add to MetaCart
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single
Mitigating routing misbehavior in mobile ad hoc networks
- Proc. ACM/IEEE MOBICOM
, 2000
"... This paper describes two techniques that improve through-put in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this prob-lem, we propose categorizing nodes based upon their dynam-ically measured behavior. We use a watchdog that identifies misb ..."
Abstract
-
Cited by 1090 (4 self)
- Add to MetaCart
This paper describes two techniques that improve through-put in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this prob-lem, we propose categorizing nodes based upon their dynam-ically measured behavior. We use a watchdog that identifies
Results 1 - 10
of
40,625