𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Secure routing in mobile wireless ad hoc networks

✍ Scribed by Siddhartha Gupte; Mukesh Singhal


Book ID
108497777
Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
460 KB
Volume
1
Category
Article
ISSN
1570-8705

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


A secure multipath routing protocol in m
✍ Hao Yin; Yang Wang; Geyong Min; Sebastien Berton; Rui Guo; Chuang Lin πŸ“‚ Article πŸ“… 2010 πŸ› John Wiley and Sons 🌐 English βš– 316 KB πŸ‘ 2 views

## Abstract Multipath routing can adapt to traffic changes, increase reliability and enhance the Quality of Service support in communication networks. This routing algorithm has been recognized as one of the salient features in Mobile __Ad hoc__ Networks (MANETs). However, existing multipath routin

Secure position-based routing protocol f
✍ Joo-Han Song; Vincent W.S. Wong; Victor C.M. Leung πŸ“‚ Article πŸ“… 2007 πŸ› Elsevier Science 🌐 English βš– 297 KB

In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of posi

Robust throughput and routing for mobile
✍ Izhak Rubin; Runhe Zhang πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 346 KB

a b s t r a c t Flows transported across mobile ad hoc wireless networks suffer from route breakups caused by nodal mobility. In a network that aims to support critical interactive real-time data transactions, to provide for the uninterrupted execution of a transaction, or for the rapid transport of

Mobility prediction and routing in ad ho
✍ William Su; Sung-Ju Lee; Mario Gerla πŸ“‚ Article πŸ“… 2001 πŸ› John Wiley and Sons 🌐 English βš– 392 KB πŸ‘ 1 views

## Abstract By exploiting non‐random behaviors for the mobility patterns that mobile users exhibit, we can predict the future state of network topology and perform route reconstruction proactively in a timely manner. Moreover, by using the predicted information on the network topology, we can elimi