Security in mobile ad-hoc networks

Y Zhang, W Lee - Ad hoc networks: technologies and protocols, 2005 - Springer
… Since tracking down a particular mobile node in a large scale ad hoc networks may not be
… the network are far more damaging and much harder to detect. Therefore, mobile nodes and …

Power-aware routing in mobile ad hoc networks

S Singh, M Woo, CS Raghavendra - … Mobile computing and networking, 1998 - dl.acm.org
… h [24] we present a MAC layer protocol for ad hoc networks that reduca energy consumption
by 40% to 70% for different load and network conditions. An overview of this work is …

[HTML][HTML] Mobile ad-hoc networks applications and its challenges

N Raza, MU Aftab, MQ Akbar, O Ashraf… - … and Network, 2016 - scirp.org
… wireless networks. Numerous mobile ad hoc network applications include large networks
huge number of nodes, as found for instance, in sensor networks and tactical networks. The …

Rethinking information theory for mobile ad hoc networks

J Andrews, S Shakkottai, R Heath… - IEEE …, 2008 - ieeexplore.ieee.org
… The most challenging and general class of wireless networks to both quantify and design
are ad hoc networks, which are mobile peer-to-peer networks that operate without the …

A robust reputation system for mobile ad-hoc networks

S Buchegger, JY Le Boudec - 2003 - infoscience.epfl.ch
… the context of neighborhood watch in mobile ad-hoc networks, specifically to the CONFIDANT
[… in the reputation system as nodes, since we apply it to nodes in a mobile ad-hoc network. …

Internet-based mobile ad hoc networking

MS Corson, JP Macker… - IEEE internet …, 1999 - ieeexplore.ieee.org
… -peer operation in mobile, forward-deployed military networks. … In this article we give an
overview of mobile ad hoc networking … from the IETF’s Mobile Ad Hoc Networks (Manet) Working …

Mobile ad hoc networking and the IETF

JP Macker, MS Corson - … Mobile Computing and Communications …, 1998 - dl.acm.org
Mobile ad hoc networking is solving a different problem by extending IP connectivity into the
… the mobile nodes themselves form the network routing infrastructure or "fabric" in an ad hoc

[PDF][PDF] A survey of routing protocols in mobile ad hoc networks

S Taneja, A Kush - International Journal of innovation, Management and …, 2010 - ijimt.org
… all the nodes in the network act as routers. The mobile nodes in the Ad Hoc network
dynamically establish routing among themselves to form their own network ‘on the fly’. This type of …

Secure data transmission in mobile ad hoc networks

P Papadimitratos, ZJ Haas - Proceedings of the 2nd ACM workshop on …, 2003 - dl.acm.org
… in the Mobile Ad Hoc Networking (… ad hoc networking environment. The security of data
transmission is achieved without restrictive assumptions on the network nodes’ trust and network

An integrated environment for testing mobile ad-hoc networks

Y Zhang, W Li - … international symposium on Mobile ad hoc networking …, 2002 - dl.acm.org
… We emulate a virtual ad-hoc network of n mobile nodes with n instance of UML running
on n hosts. The test subject runs inside an UML, and each host also runs a MobiEmu slave …