• Aucun résultat trouvé

Haut PDF DoS-Resistant Self-Keying Mobile Ad-Hoc Networks

DoS-Resistant Self-Keying Mobile Ad-Hoc Networks

DoS-Resistant Self-Keying Mobile Ad-Hoc Networks

... Unité de recherche INRIA Rhône-Alpes 655, avenue de l’Europe - 38330 Montbonnot-St-Martin France Unité de recherche INRIA Lorraine : LORIA, Technopôle de Nancy-Brabois - Campus scientifi[r] ...

32

Optimized broadcast scheme for mobile ad hoc networks

Optimized broadcast scheme for mobile ad hoc networks

... are: self pruning [3], dominant pruning [3], scalable broadcasting [4], multipoint relay [5], Ad Hoc broadcast protocol [6] and Sim- plified Multicast Forwarding for MANETs ...In self pruning, ...

13

Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures

Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures

... Keywords-reputation; mobile ad-hoc network; byzantine; ...a mobile ad hoc network, nodes cooperate in a dis- tributed and self-organized way to achieve some predefined ...

9

Simulation and Performance Analysis of MP-OLSR for Mobile Ad hoc Networks

Simulation and Performance Analysis of MP-OLSR for Mobile Ad hoc Networks

... — ad hoc networks, link state protocol, multipath routing ...for self-organizing, fast deployable wireless Mobile Ad hoc Networks (MANETs) come along with the ...

7

SLSF: Stable Linked Structure Flooding For Mobile Ad Hoc Networks

SLSF: Stable Linked Structure Flooding For Mobile Ad Hoc Networks

... large Mobile Ad hoc NETworks (MANET) where the wirelessly connected devices communi- cate spontaneously without any predefined infrastructure with each other ...such networks where it ...

7

Mobile Ad Hoc Networks: Modelling, Simulation and Broadcast-based Applications

Mobile Ad Hoc Networks: Modelling, Simulation and Broadcast-based Applications

... PDA, mobile phones, multimedia players, gaming console, etc – are becoming more and more common in our daily ...of mobile phones is close to 100% in most western European and Northern American ...more ...

165

Mobility Prediction Based Neighborhood Discovery for Mobile Ad Hoc Networks

Mobility Prediction Based Neighborhood Discovery for Mobile Ad Hoc Networks

... Abstract: Hello protocol is the basic technique for neighborhood discovery in wireless ad hoc networks. It requires nodes to claim their existence/aliveness by periodic ‘hello’ messages. Central to ...

21

Advanced receivers for distributed cooperation in mobile ad hoc networks

Advanced receivers for distributed cooperation in mobile ad hoc networks

... of self-iterating the detection process is already present in many fundamental techniques such as the well-known Decision Feedback Equalizer ( DFE ) structures used for ISI mitigation [ Bel+79 ; Cio08 ; BT05 ], or ...

332

Scalability and Quality of Service in Mobile Ad Hoc Networks

Scalability and Quality of Service in Mobile Ad Hoc Networks

... English) Ad Hoc for a particular purpose or need, especially for an immediate need In the mid 16th century, the term ad hoc has been used in the Latin language, however nowadays is used by ...

182

Routing in Large Scale tactical mobile ad hoc Networks

Routing in Large Scale tactical mobile ad hoc Networks

... military networks that is currently occurring with the ad- vent of the Network Centric Warfare adopts the concept of “Mobile Ad Hoc Network” (MANET) as a central component of the ...

204

Self-Organization in Ad Hoc Networks

Self-Organization in Ad Hoc Networks

... 4 Main objectives The main goal is to design a heuristic that selects some nodes as cluster-heads and computes clusters in a large WN network. As we mentioned in the previous section, the definition of a cluster should ...

46

AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-Hoc Networks

AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-Hoc Networks

... in 2005. They use the same cryptographic mechanism – Diffie Hellmann key agreement protocol [6] to create a shared session key for a security communication between the source node and destination node. But these security ...

12

Route Lifetime based Interactive Routing in Intervehicle Mobile Ad Hoc Networks

Route Lifetime based Interactive Routing in Intervehicle Mobile Ad Hoc Networks

... Nous supposons que pour établir un itinéraire les emplacements et les vitesses d’autres vehicules sont connus. Dans une hypothèse markovienne sur les processus des vitesse, nous prouvons que le choix optimal de la ...

24

Relaying in Mobile Ad Hoc Networks: The Brownian Motion Mobility Model

Relaying in Mobile Ad Hoc Networks: The Brownian Motion Mobility Model

... Unité de recherche INRIA Sophia Antipolis 2004, route des Lucioles - BP 93 - 06902 Sophia Antipolis Cedex France Unité de recherche INRIA Futurs : Parc Club Orsay Université - ZAC des Vi[r] ...

23

Stability Oriented Routing in Mobile Ad Hoc Networks Based on Simple Automatons

Stability Oriented Routing in Mobile Ad Hoc Networks Based on Simple Automatons

... wireless ad-hoc networks with mobile nodes have not stable topology, the classical network functions such as the routing are difficult to ...multihop ad hoc ...

29

WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks

WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks

... is mobile and each node is prone to fail or lose its connectivity to the network, due to redundancy purposes, we need at least two AAA servers in the ...expected ad hoc network size to support load ...

9

Surrogate-Assisted Optimisation of Composite Applications in Mobile Ad hoc Networks

Surrogate-Assisted Optimisation of Composite Applications in Mobile Ad hoc Networks

... to simulate a service- based firefighter decision support system where firefighters of three different hierarchical levels (Group, Engine, and Team) carry devices which offer software services and cooperatively form an ...

9

P2P SIP over mobile ad hoc networks

P2P SIP over mobile ad hoc networks

... Figure 2.3: An example of a DAG difference is that the discovered path is stored in the packet header instead of every node along the path. Nodes in the DSR are arranged in a promiscuous mode operation, causing adjacent ...

161

Opportunistic Content-Based Dissemination in Disconnected Mobile Ad Hoc Networks

Opportunistic Content-Based Dissemination in Disconnected Mobile Ad Hoc Networks

... Content-based dissemination in disconnected MANETs is addressed specifically in [12], which describes an ap- proach whereby a content-driven multi-hop routing struc- ture (limited to a given horizon) is built around each ...

7

Quality-delay tradeoff for video streaming over mobile ad hoc networks

Quality-delay tradeoff for video streaming over mobile ad hoc networks

... II. SYSTEM MODEL A. Mobility Model There are 𝒩 = {1, ..., 𝑛, ..., 𝑁} (𝑁 ∈ ℕ) nodes which are positioned in a unit torus square, i.e., the left and right edges are assumed to touch each other and the top and bottom edges ...

6

Show all 7800 documents...