Results 1 - 10
of
33,261
Gossip-based ad hoc routing
, 2002
"... Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossiping-based approach, where each node forwards a message with some probability, to reduce the overhead of the routing protocols. G ..."
Abstract
-
Cited by 379 (4 self)
- Add to MetaCart
Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossiping-based approach, where each node forwards a message with some probability, to reduce the overhead of the routing protocols
Geography-informed Energy Conservation for Ad Hoc Routing
- ACM MOBICOM
, 2001
"... We introduce a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks. GAF conserves energy by identifying nodes that are equivalent from a routing perspective and then turning off unnecessary nodes, keeping a constant level of routing fidelity. GA ..."
Abstract
-
Cited by 1045 (21 self)
- Add to MetaCart
We introduce a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks. GAF conserves energy by identifying nodes that are equivalent from a routing perspective and then turning off unnecessary nodes, keeping a constant level of routing fidelity
Geometric Ad-Hoc Routing: Of Theory and Practice
, 2003
"... All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc routing. In particular we consider two aspects: We propose a new geometric routing algorithm which is outstandingly efficient ..."
Abstract
-
Cited by 317 (13 self)
- Add to MetaCart
All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc routing. In particular we consider two aspects: We propose a new geometric routing algorithm which is outstandingly efficient
Security-Aware Ad hoc Routing for Wireless Networks
, 2001
"... We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We deve ..."
Abstract
-
Cited by 162 (0 self)
- Add to MetaCart
We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We
Ad Hoc Routing Protocol Validation
, 2005
"... We explore and evaluate methods for validation of ad hoc routing protocols which are used to set up forwarding paths in spontaneous networks of mobile devices. The focus is automatic formal verification but we also make an initial account of a protocol performance comparison using structured live te ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
We explore and evaluate methods for validation of ad hoc routing protocols which are used to set up forwarding paths in spontaneous networks of mobile devices. The focus is automatic formal verification but we also make an initial account of a protocol performance comparison using structured live
Ad-hoc Routing Abstract
, 2004
"... The members of the Committee appointed to examine the thesis of KNUT-HELGE VIK find it satisfactory and recommend that it be accepted. ii Chair ACKNOWLEDGEMENT I would like to acknowledge my advisor Sirisha Medidi, for all her help and valuable input. I would also like to acknowledge all the members ..."
Abstract
- Add to MetaCart
The members of the Committee appointed to examine the thesis of KNUT-HELGE VIK find it satisfactory and recommend that it be accepted. ii Chair ACKNOWLEDGEMENT I would like to acknowledge my advisor Sirisha Medidi, for all her help and valuable input. I would also like to acknowledge all the members of the Washington State Networking and Security Research Group. I would not have been able to complete my Master’s degree without the help of my fellow students. Thank you all for your support. iii
On the Scalability of Ad Hoc Routing Protocols
- in Proc. of IEEE Infocom
, 2002
"... A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, mobility, and traffic for each fundamental class of ad hoc routing algorithms. Protocols studied include the following: Plain ..."
Abstract
-
Cited by 60 (1 self)
- Add to MetaCart
A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, mobility, and traffic for each fundamental class of ad hoc routing algorithms. Protocols studied include the following: Plain
Security Enhanced Ad hoc Routing
"... Abstract—In present era the Security has become one of the major issues for data communication over wired and wireless networks. Apart from the earlier work on the designs of cryptography algorithms and system infrastructures, we will propose an ad hoc routing algorithm that could randomize delivery ..."
Abstract
- Add to MetaCart
Abstract—In present era the Security has become one of the major issues for data communication over wired and wireless networks. Apart from the earlier work on the designs of cryptography algorithms and system infrastructures, we will propose an ad hoc routing algorithm that could randomize
CEDAR: a Core-Extraction Distributed Ad hoc Routing Algorithm
- IEEE Journal on Selected Areas in Communications
, 1999
"... Absiract—CEDARis an algorithm for QoS routing in ad hoc network environments. It has three key components: (a) the establishment and main-tenance of a setf-organizing routing infrastructure catted the core for per-forming route computations, (b) the propagation of the link-state of stable high-bandw ..."
Abstract
-
Cited by 397 (10 self)
- Add to MetaCart
Absiract—CEDARis an algorithm for QoS routing in ad hoc network environments. It has three key components: (a) the establishment and main-tenance of a setf-organizing routing infrastructure catted the core for per-forming route computations, (b) the propagation of the link-state of stable high
A Scalable Location Service for Geographic Ad Hoc Routing,”
- Proceedings of ACM/IEEE MobiCom
, 2000
"... Abstract. GLS is a new distributed location service which tracks mobile node locations. GLS combined with geographic forwarding allows the construction of ad hoc mobile networks that scale to a larger number of nodes than possible with previous work. GLS is decentralized and runs on the mobile node ..."
Abstract
-
Cited by 769 (17 self)
- Add to MetaCart
Abstract. GLS is a new distributed location service which tracks mobile node locations. GLS combined with geographic forwarding allows the construction of ad hoc mobile networks that scale to a larger number of nodes than possible with previous work. GLS is decentralized and runs on the mobile
Results 1 - 10
of
33,261