Results 1 - 10
of
33,812
Table 4. Key management schemes for mobile ad hoc networks.
in Abstract
"... In PAGE 31: ... By fabricating and forwarding route error messages an attacker can try to disrupt the operation of existing routes, not only breaking connectivity but also creating additional routing overhead in the network as a result of legitimate nodes trying to establish alternative paths. In Table4 we present the route maintenance characteristics of the protocols we have analyzed. The solution adopted by most of the analyzed protocols requires the signing of the complete error message by the node that generates or forwards it.... In PAGE 33: ... In this section we will present several key management solutions that have been specifically proposed to address the challenges of mobile ad hoc networks and discuss their behavior in respect to mobility patterns and operational requirements. Table4 summarizes the results of our analysis. Table 4.... ..."
Table 1: Possible characteristics of simulation environments for mobile ad hoc networks and their common implementation. These characteristics are considered in Section 6 to score the different network simulators.
Cited by 3
Table 2 summarises characteristics of the five service discovery protocols presented above. Their suitability for mobile ad-hoc networks will be discussed subsequently.
2003
"... In PAGE 10: ... Table2... ..."
Table 3. Comparison of multicast routing protocols for mobile ad hoc netowrks
2005
"... In PAGE 31: ... Table3 gives comparison of typical multicast routing protocols for mobile ad hoc networks. Metrics used for comparison are the multicast delivery structure, how to acquire and maintain routing information, whether they are loop-free, the dependency on underlying unicast routing protocol, is the control packet flooding being used, the requirement for periodic control messages, the routing hierarchy and their scalability.... ..."
Table 1. Unicast routing protocols reviewed in this report
2005
"... In PAGE 9: ... Therefore, this report presents typical protocols selected from the class of similar approaches that can reflect the state-of-the-art of research work on mobile ad hoc network routing. Table1... ..."
Table 2: Performance Metrics.
"... In PAGE 5: ... When there is a constraint in the consistency requirement, the goal is to minimize the response time measure by identifying the best geographical community of interest area size while satisfying the imposed consistency requirement, when given a set of model parameters identified and parameterized characterizing the operational conditions of the mobile application in ad hoc networking environments. Table2 summarizes the performance metrics identified to evaluate location-based data consistency protocols in mobile ad hoc networks. Table 2: Performance Metrics.... ..."
Table 1 summarizes the various approaches to cooperation and their respective features as discussed in the last two sections.
2006
"... In PAGE 61: ... Table1 Cooperation enforcement schemes in various applications Validation techniques In the context of self-organizing networks like for instance wireless mobile ad hoc networks, cooperative mechanisms have to be investigated in terms of performance, fairness, and resilience to attacks, as well as cooperation enforcement. 7.... ..."
Cited by 2
Table 1. Common simulation parameters.
2007
"... In PAGE 8: ... We also present some protocol performance measures in a mobile ad hoc network environment. In Table1 , we summarize the parameters that are common for all our simulations. Comparison of Multicast and Unicast Performance We measure the av-... ..."
Cited by 1
Table 1: Classi cation of mobile hosts by parameters Quite often, low-mobility environments are associated with high bandwidths and high- mobility environments with relatively lower bandwidths [16]. Therefore, in our architecture, Super-MHs are assumed to have lower mobility than Mini-MHs. As a matter of fact, it is expected that a layer of hierarchy in ad hoc network architecture can be subdivided if we consider more parameters that a ect the classi cation of mobile hosts apos; types. This is an area for further research.
1997
"... In PAGE 3: ... However, mobile hosts participating in real ad hoc networks may be classi ed by some parameters, such as transmit capacity and moving speed. Table1 shows one way to classify mobile hosts into Mini- and Super- mobile hosts. A Super-Mobile Host (Super-MH) refers to a mobile host having large transmission power level, whereas a Mini-Mobile Host (Mini-MH) refers to one having relatively small transmission capacity.... ..."
Cited by 9
Table 1: Classi cation of mobile hosts by parameters Quite often, low-mobility environments are associated with high bandwidths and high- mobility environments with relatively lower bandwidths [16]. Therefore, in our architecture, Super-MHs are assumed to have lower mobility than Mini-MHs. As a matter of fact, it is expected that a layer of hierarchy in ad-hoc network architecture can be subdivided if we consider more parameters that a ect the classi cation of mobile hosts apos; types. This is an area for further research.
1997
"... In PAGE 3: ... However, mobile hosts participating in real ad-hoc networks may be classi ed by some parameters, such as transmit capacity and moving speed. Table1 shows one way to classify mobile hosts into Mini- and Super- mobile hosts. A Super-Mobile Host (Super-MH) refers to a mobile host having large transmission power level, whereas a Mini-Mobile Host (Mini-MH) refers to one having relatively small transmission capacity.... ..."
Cited by 9
Results 1 - 10
of
33,812