Results 301 to 310 of about 362,585 (349)
Some of the next articles are maybe not open access.

Mobile Ad-Hoc Networks Security

2012
In this paper we are focusing on closed MANETs where only authorized nodes are supposed to access the network. We denote “outsider” nodes as those nodes that are not authorized to access the network, and ‘insider” nodes as those that are. The objective of this research is to develop mechanisms that protect a closed MANET against malicious behavior from
Rehan Akbani   +2 more
openaire   +1 more source

Aeronautical Mobile Ad Hoc Networks

2008 14th European Wireless Conference, 2008
Current aeronautical communications are extremely limited by the obsolete ATN standard, which does not allow aircraft to communicate directly with each other. The aeronautical community is already moving to replace the OSI-based ATN with the more efficient and widespread TCP/IP protocols.
Kimon Karras   +3 more
openaire   +1 more source

Soft Mobile Ad-Hoc Networking

2001
Today's mobile ad-hoc networking approaches require nodes to maintain network topology and routing tables, which limits network scalability. This paper proposes soft mobile ad-hoc networks in which nodes do not maintain network topology and routing tables.
Tao Zhang, Wai Chen
openaire   +1 more source

Diagnosing mobile ad-hoc networks

Proceedings of the 4th ACM international workshop on Mobility management and wireless access, 2006
In emergency/rescue applications mobile ad-hoc networks (MANETs) play an important role as a self-organizable and rapidly deployable infrastructure. Consequently, reliable break MANETs are necessary for this type of applications. One of the key problem we are considering in this paper is the identification of faulty mobile hosts in MANETs.
Mourad Elhadef   +2 more
openaire   +1 more source

Mobile Ad Hoc Network Routing

2010
Instant deployment without relying on an existing infrastructure makes mobile ad hoc networks (MANETs) an attractive choice for many dynamic situations. However, such flexibility comes with a consequence – these networks are much more vulnerable to attacks.
Melody Moh, Ji Li
openaire   +1 more source

Characterizing mobile ad hoc networks -

Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization, 2008
This paper reports data collected during the first Mobile Ad-hoc Network Interoperability And Cooperation (MANIAC) Challenge, a multi-institution competition that allows us to study issues of interoperability and cooperation in mobile ad hoc networks (MANETs). We characterize network topology and routing.
Vivek Srivastava   +5 more
openaire   +1 more source

Wireless Mobile Ad Hoc Networks

2011
NS2 classifies communication networks into three main categories. First, wired networks are characterized by wired communication links. Chapter 7 shows a simple form of the wired links called SimpleLinks which can be used to connect regular Node discussed in Chap. 6.
Teerawat Issariyakul, Ekram Hossain
openaire   +1 more source

Managing mobile ad hoc networks

2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), 2004
Summary form only given. Tomorrow's mobile ad hoc networks emphasize adaptable and flexible networks that automatically adapt to the user's needs. Such adaptability and flexibility requires mobile networking capabilities significantly beyond what is possible with currently fielded technology.
openaire   +1 more source

Mobile ad-hoc networks (MANET)

2022
Ένα Κινητό Αδόμητο Δίκτυο αποτελείται από κόμβους που κινούνται, είτε ακολουθώντας κάποιο συγκεκριμένο μοτίβο κίνησης, είτε τυχαία, χωρίς να υπάρχει κάποια επιπλέον υποδομή που να υποστηρίζει την λειτουργία του. Εξ ορισμού, στο δίκτυο αυτό δεν υπάρχουν προκαθορισμένοι ρόλοι για τους κόμβους που συμμετέχουν, αλλά τα διάφορα καθήκοντα που αναλαμβάνουν ...
openaire   +1 more source

Adaptive approaches to relieving broadcast storms in a wireless multihop mobile ad hoc network

Proceedings 21st International Conference on Distributed Computing Systems, 2001
Y. Tseng, Sze-Yao Ni, En-Yu Shih
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy