Academic literature on the topic 'Mobile ad hoc networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile ad hoc networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mobile ad hoc networks"
Mikarić, Bratislav, Petar Spalević, and Branimir Jakšić. "Mobile ad-hoc networks: MANET." Trendovi u poslovanju 6, no. 2 (2018): 47–60. http://dx.doi.org/10.5937/trendpos1802047m.
Full textKumar, Sunil, and Kamlesh Dutta. "Securing Mobile Ad Hoc Networks." International Journal of Handheld Computing Research 7, no. 1 (January 2016): 26–76. http://dx.doi.org/10.4018/ijhcr.2016010103.
Full textGerla, Mario, Carla-Fabiana Chiasserini, Kenichi Mase, Eytan Modiano, and Jason Redi. "Mobile ad hoc wireless networks." Journal of Communications and Networks 6, no. 4 (December 2004): 291–94. http://dx.doi.org/10.1109/jcn.2004.6596848.
Full textKanellopoulos, Dimitris, and Francesca Cuomo. "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks." Electronics 10, no. 4 (February 3, 2021): 364. http://dx.doi.org/10.3390/electronics10040364.
Full text.S, Bodhy Krishna. "Study of Ad hoc Networks with Reference to MANET, VANET, FANET." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 390. http://dx.doi.org/10.23956/ijarcsse/v7i7/0159.
Full textPatel, Vinesh H., Mukesh A. Zaveri, and Hemant Kumar Rath. "Trust Based Routing in Mobile Ad-Hoc Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 318–24. http://dx.doi.org/10.7763/lnse.2015.v3.212.
Full textHavinal, Ramanna, Girish V. Attimarad, and M. N. Giriprasad. "Power Optimized Routing in Mobile Ad Hoc Networks." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (October 31, 2016): 67–72. http://dx.doi.org/10.9756/bijsesc.8245.
Full textShreya Mane. "Conceptual Aspects on Mobile Ad-Hoc Network System." international journal of engineering technology and management sciences 6, no. 6 (November 28, 2022): 555–64. http://dx.doi.org/10.46647/ijetms.2022.v06i06.095.
Full textChauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (July 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.
Full textKadoch, Michel. "Recent Advances in Mobile Ad Hoc Networks." Electronics 10, no. 12 (June 16, 2021): 1446. http://dx.doi.org/10.3390/electronics10121446.
Full textDissertations / Theses on the topic "Mobile ad hoc networks"
Huang, E. "Rethinking mobile ad hoc networks." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604708.
Full textGudapati, Supriya. "Securing mobile ad hoc networks." Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604882.
Full textWireless sensor networks has been growing rapidly over the past few decades. Due to their flexibility, wireless sensor networks have been in practice in many areas. Unlike other network architectures, Mobile Ad hoc networks (MANETs) have no central architecture; every node is free to work both as a transmitter and receiver and it depends on neighboring nodes to send relay messages. Due to their advantages, MANETs are used in many different applications like health care and military. However the wide distribution of MANETs makes it vulnerable to malicious attacks. Hence it is necessary to design a secure system for MANETs. In this report, we implement a secure system named Enhanced Adaptive Acknowledgement especially for MANETs. To ensure higher security and reduce the network overhead and delay, we use a different approach called hybrid cryptography in our proposed scheme. Enhanced Adaptive Acknowledgment detects higher malicious attackers without greatly disturbing the network performances. In the simulation we compare the differences within the Enhanced Adaptive Acknowledgment (EAACK) before and after introducing the Hybrid cryptography approach.
Kobosko, Kristoffer, and Henrik Wallentin. "Mobile Groups in Ad-hoc Networks." Thesis, Uppsala University, Department of Information Technology, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-108036.
Full textMost current research on Mobile Ad-hoc NETworks (MANETs) concerns one ad-hocnetwork at a time. A common topic is how to handle the merging of new nodesappearing in range of an existing MANET into a new, larger network. CurrentMANET implementations do not define the handling of policies for controllingmembership or routing messages, neither do they support policy-based inter-MANETrouting.
In this thesis, we present an implementation of Mobile Group Protocol (MGP) whichenhances the reactive routing protocol AODV with an administrative framework inwhich Mobile Ad-hoc NETwork (MANET) policies are defined. Such policies are usedto control membership and signaling in a MANET. We define new roles for theMANET members such as nodes, leaders and gateways. We discuss the messageexchange taking place during forming of Mobile Groups (MGs) and study the theparticular implementation by simulating a group of simple MGP scenarios usingNetwork Simulator 2 (NS-2).
We conclude our work by discussing the using of MGP as a base for an inter-MANETrouting protocol providing policy-based routing in MANETs.
Panaousis, Emmanouil A. "Security for mobile ad-hoc networks." Thesis, Kingston University, 2012. http://eprints.kingston.ac.uk/23989/.
Full textMosko, Marc Elliott. "Routing in mobile ad hoc networks /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2004. http://uclibs.org/PID/11984.
Full textDengiz, Orhan Smith Alice E. "Maximizing connectivity and performance in mobile ad hoc networks using mobile agents." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Dissertations/Dengiz_Orhan_22.pdf.
Full textGe, Renwei. "Information security in mobile ad hoc networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.57 Mb., 158 p, 2006. http://wwwlib.umi.com/dissertations/fullcit?3220810.
Full textSun, Bo. "Intrusion detection in mobile ad hoc networks." Diss., Texas A&M University, 2003. http://hdl.handle.net/1969.1/2215.
Full textHolland, Gavin Douglas. "Adaptive protocols for mobile ad hoc networks." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1445.
Full textCao, Guangtong. "Distributed services for mobile ad hoc networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/2541.
Full textBooks on the topic "Mobile ad hoc networks"
TAVLI, BULENT, and WENDI HEINZELMAN, eds. MOBILE AD HOC NETWORKS. Dordrecht: Springer Netherlands, 2006. http://dx.doi.org/10.1007/1-4020-4633-2.
Full text1965-, Basagni Stefano, ed. Mobile ad hoc networking. Hoboken, NJ: John Wiley, 2004.
Find full textNikolaidis, Ioanis, and Kui Wu, eds. Ad-Hoc, Mobile and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14785-2.
Full textKranakis, Evangelos, and Jaroslav Opatrny, eds. Ad-Hoc, Mobile, and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74823-6.
Full textPuliafito, Antonio, Dario Bruneo, Salvatore Distefano, and Francesco Longo, eds. Ad-hoc, Mobile, and Wireless Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67910-5.
Full textGrieco, Luigi Alfredo, Gennaro Boggia, Giuseppe Piro, Yaser Jararweh, and Claudia Campolo, eds. Ad-Hoc, Mobile, and Wireless Networks. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61746-2.
Full textZhang, Hongke, Stephan Olariu, Jiannong Cao, and David B. Johnson, eds. Mobile Ad-Hoc and Sensor Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77024-4.
Full textSyrotiuk, Violet R., and Edgar Chávez, eds. Ad-Hoc, Mobile, and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561354.
Full textFrey, Hannes, Xu Li, and Stefan Ruehrup, eds. Ad-hoc, Mobile, and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22450-8.
Full textKunz, Thomas, and S. S. Ravi, eds. Ad-Hoc, Mobile, and Wireless Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11814764.
Full textBook chapters on the topic "Mobile ad hoc networks"
Roy, Radhika Ranjan. "Mobile Ad Hoc Networks." In Handbook of Mobile Ad Hoc Networks for Mobility Models, 3–22. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6050-4_1.
Full textMichiardi, Pietro, and Refik Molva. "AD HOC Networks Security." In Mobile Ad Hoc Networking, 329–54. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471656895.ch12.
Full textMarina, Mahesh K., and Samir R. Das. "Routing in Mobile Ad Hoc Networks." In Ad Hoc Networks, 63–90. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-22690-7_3.
Full textZhang, Yongguang, and Wenke Lee. "Security in Mobile Ad-Hoc Networks." In Ad Hoc Networks, 249–68. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-22690-7_9.
Full textMagklara, Kalypso, Dimitrios Zorbas, and Tahiry Razafindralambo. "Node Discovery and Replacement Using Mobile Robot." In Ad Hoc Networks, 59–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36958-2_5.
Full textGong, Wei, Baoxian Zhang, and Cheng Li. "Task Assignment for Semi-opportunistic Mobile Crowdsensing." In Ad Hoc Networks, 3–14. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05888-3_1.
Full textGouvy, Nicolas, and Nathalie Mitton. "MobileR: Multi-hop Energy Efficient Localised Mobile Georouting in Wireless Sensor and Actuator Networks." In Ad Hoc Networks, 147–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29096-1_11.
Full textAwwad, Samer A. B., Chee Kyun Ng, Nor K. Noordin, Mohd Fadlee A. Rasid, and A. R. H. Alhawari. "Mobility and Traffic Adapted Cluster Based Routing for Mobile Nodes (CBR-Mobile) Protocol in Wireless Sensor Networks." In Ad Hoc Networks, 281–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17994-5_19.
Full textChe, Fei, Errol L. Lloyd, and Liang Zhao. "Improved Topology Control Algorithms for Simple Mobile Networks." In Ad Hoc Networks, 450–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_30.
Full textŞen, Sevil, John A. Clark, and Juan E. Tapiador. "Power-Aware Intrusion Detection in Mobile Ad Hoc Networks." In Ad Hoc Networks, 224–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_15.
Full textConference papers on the topic "Mobile ad hoc networks"
Kaur, Kirandeep, and Satinder Kaur. "A Brief Review of Energy Efficient Protocols in Mobile Ad hoc Networks." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.36.
Full textKarras, Kimon, Theodore Kyritsis, Massimiliano Amirfeiz, and Stefano Baiotti. "Aeronautical Mobile Ad Hoc Networks." In 2008 European Wireless Conference (EW). IEEE, 2008. http://dx.doi.org/10.1109/ew.2008.4623845.
Full textLahav, Jonathan, and Ariel Stulman. "Virtual Mobile Ad-hoc Networks." In 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2013. http://dx.doi.org/10.1109/mass.2013.95.
Full textSrivastava, Vivek, Amr B. Hilal, Michael S. Thompson, Jawwad N. Chattha, Allen B. MacKenzie, and Luiz A. DaSilva. "Characterizing mobile ad hoc networks -." In the third ACM international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1410077.1410090.
Full textElhadef, Mourad, Azzedine Boukerche, and Hisham Elkadiki. "Diagnosing mobile ad-hoc networks." In the international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1164783.1164787.
Full textVieira, Antônio Carlos Castañon, Sergio Luiz Cardoso Salomão, Aloysio de Castro Pinto Pedrosa, and Antônio Carneiro de Mesquita Filho. "Security Applications for Ad Hoc Networks." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2003. http://dx.doi.org/10.5753/sbseg.2003.21251.
Full textYi, Seung, Jeff Meegan, and Jae H. Kim. "Network Autoconfiguration for Mobile Ad Hoc Networks." In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455336.
Full textChatzidakis, Michail, and Stathes Hadjiefthymiades. "Trust management in mobile ad hoc networks." In 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks). IEEE, 2014. http://dx.doi.org/10.1109/netwks.2014.6958525.
Full textMomeni, Sadaf, Mahmood Fathy, and Nasser Mozayani. "Vehicle Ad-Hoc Networks Clustering." In 2008 4th Advanced Satellite Mobile Systems (ASMS). IEEE, 2008. http://dx.doi.org/10.1109/asms.2008.58.
Full textStuedi, P., and G. Alonso. "Transparent heterogeneous mobile ad hoc networks." In The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. IEEE, 2005. http://dx.doi.org/10.1109/mobiquitous.2005.63.
Full textReports on the topic "Mobile ad hoc networks"
Clausen, T., C. Dearlove, and B. Adamson. Jitter Considerations in Mobile Ad Hoc Networks (MANETs). RFC Editor, February 2008. http://dx.doi.org/10.17487/rfc5148.
Full textMacker, Joseph P., Justin W. Dean, Ronald D. Lee, Robert B. Adamson, Ian Taylor, and Andrew Harrison. Distributed Service Discovery within Mobile Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, September 2011. http://dx.doi.org/10.21236/ada550313.
Full textJoneckis, Lance, Corinne Kramer, David Sparrow, and David Tate. Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada618314.
Full textGoldsby, Michael E., Michael M. Johnson, Dominique Marie Kilman, Neal Robert Bierbaum, Helen Y. Chen, Heidi R. Ammerlahn, Rose P. Tsang, and David M. Nicol. Robust message routing for mobile (wireless) ad hoc networks. Office of Scientific and Technical Information (OSTI), January 2004. http://dx.doi.org/10.2172/918216.
Full textZeidler, James R., J. J. Garcia-Luna, Yingbo Hua, Simon Haykin, Hamid Jafarkhani, Tara Javidi, Michael Jensen, Srikanth Krishnamurthy, Laurence Milstein, and John Proakis. Space-Time Processing for Tactical Mobile Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2010. http://dx.doi.org/10.21236/ada544669.
Full textMaltz, David A. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada460040.
Full textPeacock, Brent A. Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare. Fort Belvoir, VA: Defense Technical Information Center, April 2007. http://dx.doi.org/10.21236/ada497761.
Full textClausen, T., and C. Dearlove. Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs). RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5497.
Full textJoneckis, Lance, Corinne Kramer, David Sparrow, and David Tate. Modeling Terrain Impact on Mobile Ad Hoc Networks (MANET) Connectivity. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada613291.
Full textPerich, Filip, Jeffrey Undercoffer, Lalana Kagal, Anupam Joshi, Timothy Finin, and Yelena Yesha. In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada439635.
Full text