• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,092
Next 10 →

The Security of Vehicular Ad Hoc Networks

by Maxim Raya, Jean-Pierre Hubaux - SASN , 2005
"... Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, wh ..."
Abstract - Cited by 298 (12 self) - Add to MetaCart
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made

Performance comparison of two on-demand routing protocols for ad hoc networks

by Samir R. Das, Charles E. Perkins , Elizabeth M. Royer , 2000
"... Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of two prominent ondemand routing protocols for mobile ad hoc networks — Dynamic Source Routing (DSR) and Ad Ho ..."
Abstract - Cited by 554 (21 self) - Add to MetaCart
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of two prominent ondemand routing protocols for mobile ad hoc networks — Dynamic Source Routing (DSR) and Ad

An Energy-Efficient MAC Protocol for Wireless Sensor Networks

by Wei Ye, John Heidemann, Deborah Estrin , 2002
"... This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect senso ..."
Abstract - Cited by 1517 (36 self) - Add to MetaCart
sensor networks to be deployed in an ad hoc fashion, with individual nodes remaining largely inactive for long periods of time, but then becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional

Power-Aware Routing in Mobile Ad Hoc Networks

by Mike Woo, Suresh Singh, C. S. Raghavendra , 1998
"... In this paper we present a case for using new power-aware metrics for determining routes in wireless ad hoc networks. We present five different metrics based on battery power consumption at nodes. We show that using these metrics in a shortest-cost routing algorithm reduces the cost/packet of rout ..."
Abstract - Cited by 775 (5 self) - Add to MetaCart
In this paper we present a case for using new power-aware metrics for determining routes in wireless ad hoc networks. We present five different metrics based on battery power consumption at nodes. We show that using these metrics in a shortest-cost routing algorithm reduces the cost

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

by Josh Broch, David A. Maltz, David B. Johnson, Yih-chun Hu, Jorjeta Jetcheva , 1998
"... An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the limited transmission range of wireless network interfaces, multiple network "hops " ma ..."
Abstract - Cited by 1819 (25 self) - Add to MetaCart
is available. This paper presents the results of a detailed packet-level simulation comparing four multi-hop wireless ad hoc network routing protocols that cover a range of design choices: DSDV, TORA, DSR, and AODV. We have extended the ns-2 network simulator to accurately model the MAC and physical

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using a Single Transceiver

by Jungmin So, Nitin Vaidya - In ACM MobiHoc , 2004
"... This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that utilizes multiple channels dynamically to improve performance. The IEEE 802.11 standard allows for the use of multiple channels available at the physical layer, but its MAC protocol is designed only for a si ..."
Abstract - Cited by 431 (6 self) - Add to MetaCart
This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that utilizes multiple channels dynamically to improve performance. The IEEE 802.11 standard allows for the use of multiple channels available at the physical layer, but its MAC protocol is designed only for a

Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks

by Wei Ye, John Heidemann, Deborah Estrin - IEEE/ACM Transactions on Networking , 2004
"... This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect senso ..."
Abstract - Cited by 702 (15 self) - Add to MetaCart
sensor networks to be deployed in an ad hoc fashion, with nodes remaining largely inactive for long time, but becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 802

An Efficient and Reliable MAC for Vehicular Ad Hoc Networks

by Duc Ngoc, Minh Dang, Hanh Ngoc Dangy, Cuong The Do, Choong Seon Hong
"... Abstract—The IEEE 1609.4 is a MAC extension of IEEE 802.11p to support multi-channel operations. All nodes have to tune to the Control Channel (CCH) during the CCH Interval (CCHI) for exchanging safety messages (SMsgs) and other control messages. Nodes can optionally switch to the Service Channels ( ..."
Abstract - Add to MetaCart
(SCHs) to exchange non-safety messages during the SCH Interval (SCHI). The IEEE 1609.4 cannot utilize all SCHs resource during the CCHI. This paper proposes an Efficient and Reliable MAC protocol for Vehicular Ad hoc Networks, named VER-MAC, which allows nodes to transmit non-safety messages during

AE-VeMAC: An Enhanced VeMAC Protocol for Vehicular Ad hoc Networks

by Vandung Nguyen, Duc Ngoc, Minh Dang, Choong Seon Hong
"... VeMAC, a novel TDMA MAC protocol, is proposed for vehicle ad hoc network. Based on TDMA scheme and direction of moving vehicles, the VeMAC protocol supports higher throughput and decreases the rate of transmission collisions. However, the overhead of the packet transmitted on the control channel is ..."
Abstract - Add to MetaCart
VeMAC, a novel TDMA MAC protocol, is proposed for vehicle ad hoc network. Based on TDMA scheme and direction of moving vehicles, the VeMAC protocol supports higher throughput and decreases the rate of transmission collisions. However, the overhead of the packet transmitted on the control channel

Vehicular Ad-hoc Networks

by Asad Maqsood, Rehanullah Khan
"... Modern day’s vehicles require advanced communication system on board to enable passengers benefit the most from available services. IEEE 802.11p is the new extension of IEEE 802.11 standards; especially proposed for the high vehicular environment. The WAVE documentation represents enhancements to th ..."
Abstract - Add to MetaCart
to the Media Access Control (MAC) and Physical (PHY) layer of IEEE 802.11 standards to work efficiently in high vehicular environment. In this research work, the main emphasis is on the new IEEE 802.11p enhancement of MAC and PHY layers. More specifically, the target of this research is to setup a simulation
Next 10 →
Results 1 - 10 of 2,092
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University