Results 261 to 270 of about 30,172 (317)
Unmanned aerial vehicle routing based on frog-leaping optimization algorithm. [PDF]
Maleki F, Jamali MAJ, Heidari A.
europepmc +1 more source
Intensive study, tuning and modification of reactive routing approach to improve flat FANET performance in data collection scenario. [PDF]
El-Basioni BMM.
europepmc +1 more source
An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security. [PDF]
Hasan MZ+4 more
europepmc +1 more source
Energy-Efficient Clustering in Wireless Sensor Networks Using Grey Wolf Optimization and Enhanced CSMA/CA. [PDF]
Kaddi M, Omari M, Salameh K, Alnoman A.
europepmc +1 more source
Research on rechargeable agricultural wireless sensor network based on ZigBee immune routing repair algorithm. [PDF]
Tang R+5 more
europepmc +1 more source
Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol
A particularly severe attack on routing protocols in ad hoc networks is the so-called wormhole attack in which two or more colluding attacking nodes record packets at one location, and tunnel them to another location for a replay at that remote location.
Farid Naït‐Abdesselam+2 more
openalex +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Location Aware Optimized Link State Routing protocol
MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012Radio tactical scenarios are rapidly evolving and MANETs (Mobile Ad-hoc NETworks) are more and more frequently adopted because of their recognized advantages (absence of infrastructure, mobility management, traffic forwarding, etc.), also pushed by the rapid evolution of Software Defined Radio (SDR).
Lucio Marcenaro+3 more
openaire +2 more sources