Academic literature on the topic 'Mobile ad hoc networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile ad hoc networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile ad hoc networks"

1

Mikarić, Bratislav, Petar Spalević, and Branimir Jakšić. "Mobile ad-hoc networks: MANET." Trendovi u poslovanju 6, no. 2 (2018): 47–60. http://dx.doi.org/10.5937/trendpos1802047m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Sunil, and Kamlesh Dutta. "Securing Mobile Ad Hoc Networks." International Journal of Handheld Computing Research 7, no. 1 (January 2016): 26–76. http://dx.doi.org/10.4018/ijhcr.2016010103.

Full text
Abstract:
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for various types of applications such as military communication, emergency search and rescue operations, disaster recovery, battlefields, communication between moving vehicles (VANET etc. However, MANETs are highly susceptible to various security threats due to their inherent characteristics that can adversely affect their performance. In order to provide secure communication in mobile ad hoc networks, it is required to understand various possible attacks at different layers of the communication protocol stack. The intent of this paper is to provide structured and comprehensive study of prominent security attacks reported in the literature for mobile ad hoc networks. In addition, we also discuss various well-known reactive and proactive security solutions proposed in literature to prevent those attacks in MANETs. Finally, the paper is concluded with a brief discussion on future direction of research in MANETs.
APA, Harvard, Vancouver, ISO, and other styles
3

Gerla, Mario, Carla-Fabiana Chiasserini, Kenichi Mase, Eytan Modiano, and Jason Redi. "Mobile ad hoc wireless networks." Journal of Communications and Networks 6, no. 4 (December 2004): 291–94. http://dx.doi.org/10.1109/jcn.2004.6596848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kanellopoulos, Dimitris, and Francesca Cuomo. "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks." Electronics 10, no. 4 (February 3, 2021): 364. http://dx.doi.org/10.3390/electronics10040364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

.S, Bodhy Krishna. "Study of Ad hoc Networks with Reference to MANET, VANET, FANET." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 390. http://dx.doi.org/10.23956/ijarcsse/v7i7/0159.

Full text
Abstract:
A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Patel, Vinesh H., Mukesh A. Zaveri, and Hemant Kumar Rath. "Trust Based Routing in Mobile Ad-Hoc Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 318–24. http://dx.doi.org/10.7763/lnse.2015.v3.212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Havinal, Ramanna, Girish V. Attimarad, and M. N. Giriprasad. "Power Optimized Routing in Mobile Ad Hoc Networks." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (October 31, 2016): 67–72. http://dx.doi.org/10.9756/bijsesc.8245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shreya Mane. "Conceptual Aspects on Mobile Ad-Hoc Network System." international journal of engineering technology and management sciences 6, no. 6 (November 28, 2022): 555–64. http://dx.doi.org/10.46647/ijetms.2022.v06i06.095.

Full text
Abstract:
A mobile ad hoc network is made up of mobile wireless hosts. When hosts move, the routes change, necessitating the need for a system to find new routes. A crucial aspect of the development of wireless networks is ad-hoc networking. Ad-hoc networks often consist of identical nodes that connect with one another via wireless links without the use of a centralized controller. Ad-hoc wireless networks carry over the standard issues with wireless and mobile communications, like bandwidth optimization, battery management, and improvement of transmission quality. Due to its self-upkeep and self-configuration characteristics or behavior, mobile ad hoc networks (MANET) have achieved great success and attention. Routing attacks are used to quickly alter the network topology of MANETs based on wired and wireless networks. Therefore, securing this network without infrastructure is a big problem. In recent years, experts from all over the worldhave paid particular attention to research on improving the performance of mobile ad-hoc networks (MANETs). Routing methods are especially crucial in a dynamic network environment like MANET for enhancing overall network performance. In addition to discussing the technical difficulties that protocol designers and network engineers must overcome, this paper offers insight into the possible applications of ad hoc networks. Routing, service and resource discovery, Internet access, billing, and security are some of these difficulties.
APA, Harvard, Vancouver, ISO, and other styles
9

Chauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (July 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.

Full text
Abstract:
Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc networks. In this scheme, network topology is partitioned into non-overlapping clusters based on the physical network proximity. This approach fully exploits the pull mechanism to facilitate cache sharing in a MANET. Simulation experiments show that GCC mechanism achieves significant improvements in cache hit ratio and average query latency in comparison with other caching strategies.
APA, Harvard, Vancouver, ISO, and other styles
10

Kadoch, Michel. "Recent Advances in Mobile Ad Hoc Networks." Electronics 10, no. 12 (June 16, 2021): 1446. http://dx.doi.org/10.3390/electronics10121446.

Full text
Abstract:
Mobile ad hoc networks (MANETs) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastructure and have attracted decades of research effort [...]
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Mobile ad hoc networks"

1

Huang, E. "Rethinking mobile ad hoc networks." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604708.

Full text
Abstract:
This thesis explores the physical layer feasibility, performance and limitations of MANETs through simulation and evaluation of a novel application scenario. The results of the work are intended to help researchers understand how and where MANETs can be used in the future, as well as to better understand physical layer considerations and methods of improving the physical layer performance of large scale, highly mobile MANETs. The thesis also investigates the effect and feasibility of using fixed relay or dispatch points that act as intermediate relays or source/sinks for messages. The results show the relative benefits of using relays vs. dispatch points, as well as the differences owing to the position, configuration and number of fixed points. We are then able to deduce the optimum configuration and type of fixed nodes to use to achieve the best results under various circumstances. Given the limited unlicensed spectrum available and the potentially high number of nodes in a bounded area, it is likely that interference will become a significant limiting factor for performance. The thesis explores this and other related issues to discover the significance of their effects and the necessary bounds for reasonable performance. We also explore the use of various techniques to mitigate these effects. The thesis concludes by investigating the issue of cooperation incentives. Without sufficient nodes cooperating to provide relaying functions, a MANET cannot function properly. Consequently various proposals have been made which provide incentives for individual users of a MANET to cooperate with each other. We examine the drawbacks of currently proposed incentive systems and propose a new solution.
APA, Harvard, Vancouver, ISO, and other styles
2

Gudapati, Supriya. "Securing mobile ad hoc networks." Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604882.

Full text
Abstract:

Wireless sensor networks has been growing rapidly over the past few decades. Due to their flexibility, wireless sensor networks have been in practice in many areas. Unlike other network architectures, Mobile Ad hoc networks (MANETs) have no central architecture; every node is free to work both as a transmitter and receiver and it depends on neighboring nodes to send relay messages. Due to their advantages, MANETs are used in many different applications like health care and military. However the wide distribution of MANETs makes it vulnerable to malicious attacks. Hence it is necessary to design a secure system for MANETs. In this report, we implement a secure system named Enhanced Adaptive Acknowledgement especially for MANETs. To ensure higher security and reduce the network overhead and delay, we use a different approach called hybrid cryptography in our proposed scheme. Enhanced Adaptive Acknowledgment detects higher malicious attackers without greatly disturbing the network performances. In the simulation we compare the differences within the Enhanced Adaptive Acknowledgment (EAACK) before and after introducing the Hybrid cryptography approach.

APA, Harvard, Vancouver, ISO, and other styles
3

Kobosko, Kristoffer, and Henrik Wallentin. "Mobile Groups in Ad-hoc Networks." Thesis, Uppsala University, Department of Information Technology, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-108036.

Full text
Abstract:

Most current research on Mobile Ad-hoc NETworks (MANETs) concerns one ad-hocnetwork at a time. A common topic is how to handle the merging of new nodesappearing in range of an existing MANET into a new, larger network. CurrentMANET implementations do not define the handling of policies for controllingmembership or routing messages, neither do they support policy-based inter-MANETrouting.

In this thesis, we present an implementation of Mobile Group Protocol (MGP) whichenhances the reactive routing protocol AODV with an administrative framework inwhich Mobile Ad-hoc NETwork (MANET) policies are defined. Such policies are usedto control membership and signaling in a MANET. We define new roles for theMANET members such as nodes, leaders and gateways. We discuss the messageexchange taking place during forming of Mobile Groups (MGs) and study the theparticular implementation by simulating a group of simple MGP scenarios usingNetwork Simulator 2 (NS-2).

We conclude our work by discussing the using of MGP as a base for an inter-MANETrouting protocol providing policy-based routing in MANETs.

APA, Harvard, Vancouver, ISO, and other styles
4

Panaousis, Emmanouil A. "Security for mobile ad-hoc networks." Thesis, Kingston University, 2012. http://eprints.kingston.ac.uk/23989/.

Full text
Abstract:
Ad-hoc networks are crucial enablers of next generation communications. Such networks can be formed and reconfigured dynamically and they can be mobile, standalone or inter-networked with other networks. Mobile Ad-hoc NETworks (MANETs) are established by group of autonomous nodes that communicate with each other by establishing a multihop radio network and maintain connectivity in an infrastructureless manner. Security of the connections between devices and networks is crucial. Current MANET routing protocols inherently trust all participants being cooperative by nature and they depend on neighbouring nodes to route packets to a destination. Such a model allows malicious nods to potentially harm MANET communications links or reveal confidential data by launching different kind of attacks. The main objective of this thesis is to investigate and propose security mechanisms for MANET communications mainly emphasising on emergency scenarios where first responders' devices communicate by establishing a decentralised wireless network. To this end, we have proposed security mechanisms for innovtive routing and peer-to-peer overlay mechanisms for emergency MANETs proposed supplementarily to the findings of this thesis. Such security mechanisms guarntee confidentiality and integrity of the emergency MANET communications. We have also proposed novel ways of improving availability in MANETs in presence of intrusion detection systems by increasing the nodes' lifetime based on a novel game theoretic routing protocol for MANETs. We have thoroughly evaluated the performance of all the proposed mechanisms using a network simulator. The main objective of undertaking these evaluations was to guarantee that security introduces affordable overhead thereby respecting the Quality-of-Service of MANET communication links.
APA, Harvard, Vancouver, ISO, and other styles
5

Mosko, Marc Elliott. "Routing in mobile ad hoc networks /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2004. http://uclibs.org/PID/11984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dengiz, Orhan Smith Alice E. "Maximizing connectivity and performance in mobile ad hoc networks using mobile agents." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Dissertations/Dengiz_Orhan_22.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ge, Renwei. "Information security in mobile ad hoc networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.57 Mb., 158 p, 2006. http://wwwlib.umi.com/dissertations/fullcit?3220810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sun, Bo. "Intrusion detection in mobile ad hoc networks." Diss., Texas A&M University, 2003. http://hdl.handle.net/1969.1/2215.

Full text
Abstract:
Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a cooperative and friendly network environment and do not accommodate security. Therefore, Intrusion Detection Systems (IDSs), serving as the second line of defense for information systems, are indispensable for MANETs with high security requirements. Central to the research described in this dissertation is the proposed two-level nonoverlapping Zone-Based Intrusion Detection System (ZBIDS) which fit the unique requirement of MANETs. First, in the low-level of ZBIDS, I propose an intrusion detection agent model and present a Markov Chain based anomaly detection algorithm. Local and trusted communication activities such as routing table related features are periodically selected and formatted with minimum errors from raw data. A Markov Chain based normal profile is then constructed to capture the temporal dependency among network activities and accommodate the dynamic nature of raw data. A local detection model aggregating abnormal behaviors is constructed to reflect recent subject activities in order to achieve low false positive ratio and high detection ratio. A set of criteria to tune parameters is developed and the performance trade-off is discussed. Second, I present a nonoverlapping Zone-based framework to manage locally generated alerts from a wider area. An alert data model conformed to the Intrusion Detection Message Exchange Format (IDMEF) is presented to suit the needs of MANETs. Furthermore, an aggregation algorithm utilizing attribute similarity from alert messages is proposed to integrate security related information from a wider area. In this way, the gateway nodes of ZBIDS can reduce false positive ratio, improve detection ratio, and present more diagnostic information about the attack. Third, MANET IDSs need to consider mobility impact and adjust their behavior dynamically. I first demonstrate that nodes?? moving speed, a commonly used parameter in tuning IDS performance, is not an effective metric for the performance measurement of MANET IDSs. A new feature -link change rate -is then proposed as a unified metric for local MANET IDSs to adaptively select normal profiles . Different mobility models are utilized to evaluate the performance of the adaptive mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
9

Holland, Gavin Douglas. "Adaptive protocols for mobile ad hoc networks." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1445.

Full text
Abstract:
Recent advances in low-power technologies have resulted in the proliferation of inexpensive handheld mobile computing devices. Soon, just like the Internet empow- ered a whole new world of applications for personal computers, the development and deployment of robust ubiquitous wireless networks will enable many new and exciting futuristic applications. Certain to be an important part of this future is a class of networks known as "mobile ad hoc networks." Mobile ad hoc networks (or simply "ad hoc networks") are local-area networks formed "on the spot" between collocated wireless devices. These devices self-organize by sharing information with their neigh- bors to establish communication pathways whenever and wherever they are. For ad hoc networks to succeed, however, new protocols must be developed that are capable of adapting to their dynamic nature. In this dissertation, we present a number of adaptive protocols that are designed for this purpose. We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match the channel conditions perceived by the receiver. We also investigate routing protocols that adapt route selection according to network characteristics. In particular, we present two on-demand routing protocols that are designed to take advantage of the presence of multirate links. We then investigate the performance of TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses explicit feedback messages from the link layer about link failures to adapt TCP's behavior. Finally, we show how link failures in heterogeneous networks containing links with widely varying bandwidth and delay can cause repeated "modal" changes in capacity that TCP is slow to detect. We then present a modifed version of TCP that is capable of more rapidly detecting and adapting to these changes.
APA, Harvard, Vancouver, ISO, and other styles
10

Cao, Guangtong. "Distributed services for mobile ad hoc networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/2541.

Full text
Abstract:
A mobile ad hoc network consists of certain nodes that communicate only through wireless medium and can move arbitrarily. The key feature of a mobile ad hoc network is the mobility of the nodes. Because of the mobility, communication links form and disappear as nodes come into and go out of each other's communica- tion range. Mobile ad hoc networks are particularly useful in situations like disaster recovery and search, military operations, etc. Research on mobile ad hoc networks has drawn a huge amount of attention recently. The main challenges for mobile ad hoc networks are the sparse resources and frequent mobility. Most of the research work has been focused on the MAC and routing layer. In this work, we focus on distributed services for mobile ad hoc networks. These services will provide some fundamental functions in developing various applications for mobile ad hoc networks. In particular, we focus on the clock synchronization, connected dominating set, and k-mutual exclusion problems in mobile ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Mobile ad hoc networks"

1

TAVLI, BULENT, and WENDI HEINZELMAN, eds. MOBILE AD HOC NETWORKS. Dordrecht: Springer Netherlands, 2006. http://dx.doi.org/10.1007/1-4020-4633-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

1965-, Basagni Stefano, ed. Mobile ad hoc networking. Hoboken, NJ: John Wiley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nikolaidis, Ioanis, and Kui Wu, eds. Ad-Hoc, Mobile and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14785-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kranakis, Evangelos, and Jaroslav Opatrny, eds. Ad-Hoc, Mobile, and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74823-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Puliafito, Antonio, Dario Bruneo, Salvatore Distefano, and Francesco Longo, eds. Ad-hoc, Mobile, and Wireless Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67910-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grieco, Luigi Alfredo, Gennaro Boggia, Giuseppe Piro, Yaser Jararweh, and Claudia Campolo, eds. Ad-Hoc, Mobile, and Wireless Networks. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61746-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Hongke, Stephan Olariu, Jiannong Cao, and David B. Johnson, eds. Mobile Ad-Hoc and Sensor Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77024-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Syrotiuk, Violet R., and Edgar Chávez, eds. Ad-Hoc, Mobile, and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Frey, Hannes, Xu Li, and Stefan Ruehrup, eds. Ad-hoc, Mobile, and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22450-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kunz, Thomas, and S. S. Ravi, eds. Ad-Hoc, Mobile, and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11814764.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Mobile ad hoc networks"

1

Roy, Radhika Ranjan. "Mobile Ad Hoc Networks." In Handbook of Mobile Ad Hoc Networks for Mobility Models, 3–22. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6050-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Michiardi, Pietro, and Refik Molva. "AD HOC Networks Security." In Mobile Ad Hoc Networking, 329–54. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471656895.ch12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marina, Mahesh K., and Samir R. Das. "Routing in Mobile Ad Hoc Networks." In Ad Hoc Networks, 63–90. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-22690-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yongguang, and Wenke Lee. "Security in Mobile Ad-Hoc Networks." In Ad Hoc Networks, 249–68. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-22690-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Magklara, Kalypso, Dimitrios Zorbas, and Tahiry Razafindralambo. "Node Discovery and Replacement Using Mobile Robot." In Ad Hoc Networks, 59–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36958-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gong, Wei, Baoxian Zhang, and Cheng Li. "Task Assignment for Semi-opportunistic Mobile Crowdsensing." In Ad Hoc Networks, 3–14. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05888-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gouvy, Nicolas, and Nathalie Mitton. "MobileR: Multi-hop Energy Efficient Localised Mobile Georouting in Wireless Sensor and Actuator Networks." In Ad Hoc Networks, 147–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29096-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Awwad, Samer A. B., Chee Kyun Ng, Nor K. Noordin, Mohd Fadlee A. Rasid, and A. R. H. Alhawari. "Mobility and Traffic Adapted Cluster Based Routing for Mobile Nodes (CBR-Mobile) Protocol in Wireless Sensor Networks." In Ad Hoc Networks, 281–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17994-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Che, Fei, Errol L. Lloyd, and Liang Zhao. "Improved Topology Control Algorithms for Simple Mobile Networks." In Ad Hoc Networks, 450–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Şen, Sevil, John A. Clark, and Juan E. Tapiador. "Power-Aware Intrusion Detection in Mobile Ad Hoc Networks." In Ad Hoc Networks, 224–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile ad hoc networks"

1

Kaur, Kirandeep, and Satinder Kaur. "A Brief Review of Energy Efficient Protocols in Mobile Ad hoc Networks." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.36.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) is an assemblage of multi-hop wireless mobile nodes that communicate with each other without centralized control and established infrastructure. Energy efficient routing is not merely concerned about less power consumption, it also deals with increasing the time duration in which any network maintains certain performance level. Therefore, power management becomes an essential issue. Considering this, various authors have designed and developed different techniques to enhance the energy efficiency of mobile networks. This paper focuses on the comparative study of different developments and modifications that have been carried out in this field in past decades. It also highlights how these modifications have helped to enhance the network lifetime.
APA, Harvard, Vancouver, ISO, and other styles
2

Karras, Kimon, Theodore Kyritsis, Massimiliano Amirfeiz, and Stefano Baiotti. "Aeronautical Mobile Ad Hoc Networks." In 2008 European Wireless Conference (EW). IEEE, 2008. http://dx.doi.org/10.1109/ew.2008.4623845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lahav, Jonathan, and Ariel Stulman. "Virtual Mobile Ad-hoc Networks." In 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2013. http://dx.doi.org/10.1109/mass.2013.95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Srivastava, Vivek, Amr B. Hilal, Michael S. Thompson, Jawwad N. Chattha, Allen B. MacKenzie, and Luiz A. DaSilva. "Characterizing mobile ad hoc networks -." In the third ACM international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1410077.1410090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Elhadef, Mourad, Azzedine Boukerche, and Hisham Elkadiki. "Diagnosing mobile ad-hoc networks." In the international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1164783.1164787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vieira, Antônio Carlos Castañon, Sergio Luiz Cardoso Salomão, Aloysio de Castro Pinto Pedrosa, and Antônio Carneiro de Mesquita Filho. "Security Applications for Ad Hoc Networks." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2003. http://dx.doi.org/10.5753/sbseg.2003.21251.

Full text
Abstract:
Nowadays, data security is an important issue in telecommunication network to be considered in its implementation and operation, mainly in wireless network without infrastructure as the Ad Hoc networks. This paper presents the Godzuk symmetric cryptographic algorithm, as a possible standard for this kind of mobile communication.
APA, Harvard, Vancouver, ISO, and other styles
7

Yi, Seung, Jeff Meegan, and Jae H. Kim. "Network Autoconfiguration for Mobile Ad Hoc Networks." In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chatzidakis, Michail, and Stathes Hadjiefthymiades. "Trust management in mobile ad hoc networks." In 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks). IEEE, 2014. http://dx.doi.org/10.1109/netwks.2014.6958525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Momeni, Sadaf, Mahmood Fathy, and Nasser Mozayani. "Vehicle Ad-Hoc Networks Clustering." In 2008 4th Advanced Satellite Mobile Systems (ASMS). IEEE, 2008. http://dx.doi.org/10.1109/asms.2008.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stuedi, P., and G. Alonso. "Transparent heterogeneous mobile ad hoc networks." In The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. IEEE, 2005. http://dx.doi.org/10.1109/mobiquitous.2005.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mobile ad hoc networks"

1

Clausen, T., C. Dearlove, and B. Adamson. Jitter Considerations in Mobile Ad Hoc Networks (MANETs). RFC Editor, February 2008. http://dx.doi.org/10.17487/rfc5148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Macker, Joseph P., Justin W. Dean, Ronald D. Lee, Robert B. Adamson, Ian Taylor, and Andrew Harrison. Distributed Service Discovery within Mobile Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, September 2011. http://dx.doi.org/10.21236/ada550313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Joneckis, Lance, Corinne Kramer, David Sparrow, and David Tate. Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada618314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goldsby, Michael E., Michael M. Johnson, Dominique Marie Kilman, Neal Robert Bierbaum, Helen Y. Chen, Heidi R. Ammerlahn, Rose P. Tsang, and David M. Nicol. Robust message routing for mobile (wireless) ad hoc networks. Office of Scientific and Technical Information (OSTI), January 2004. http://dx.doi.org/10.2172/918216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zeidler, James R., J. J. Garcia-Luna, Yingbo Hua, Simon Haykin, Hamid Jafarkhani, Tara Javidi, Michael Jensen, Srikanth Krishnamurthy, Laurence Milstein, and John Proakis. Space-Time Processing for Tactical Mobile Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2010. http://dx.doi.org/10.21236/ada544669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maltz, David A. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada460040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Peacock, Brent A. Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare. Fort Belvoir, VA: Defense Technical Information Center, April 2007. http://dx.doi.org/10.21236/ada497761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Clausen, T., and C. Dearlove. Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs). RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Joneckis, Lance, Corinne Kramer, David Sparrow, and David Tate. Modeling Terrain Impact on Mobile Ad Hoc Networks (MANET) Connectivity. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada613291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Perich, Filip, Jeffrey Undercoffer, Lalana Kagal, Anupam Joshi, Timothy Finin, and Yelena Yesha. In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada439635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography