Topology control in wireless ad hoc and sensor networks

P Santi - ACM computing surveys (CSUR), 2005 - dl.acm.org
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and
sensor networks to reduce energy consumption (which is essential to extend the network …

A survey of social-based routing in delay tolerant networks: Positive and negative social effects

Y Zhu, B Xu, X Shi, Y Wang - IEEE Communications Surveys & …, 2012 - ieeexplore.ieee.org
Delay tolerant networks (DTNs) may lack continuous network connectivity. Routing in DTNs
is thus challenging since it must handle network partitioning, long delays, and dynamic …

[PDF][PDF] TRM-IoT: A trust management model based on fuzzy reputation for internet of things

D Chen, G Chang, D Sun, J Li, J Jia… - Computer Science and …, 2011 - researchgate.net
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into
Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is …

Mobile ad hoc networking: imperatives and challenges

I Chlamtac, M Conti, JJN Liu - Ad hoc networks, 2003 - Elsevier
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …

Performance analysis of the CONFIDANT protocol

S Buchegger, JY Le Boudec - Proceedings of the 3rd ACM international …, 2002 - dl.acm.org
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing
and forwarding. However, it may be advantageous for individual nodes not to cooperate. We …

VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks

J Zhao, G Cao - IEEE transactions on vehicular technology, 2008 - ieeexplore.ieee.org
Multihop data delivery through vehicular ad hoc networks is complicated by the fact that
vehicular networks are highly mobile and frequently disconnected. To address this issue, we …

Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks

S Zhong, J Chen, YR Yang - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
Mobile ad hoc networking has been an active research area for several years. How to
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …

An acknowledgment-based approach for the detection of routing misbehavior in MANETs

K Liu, J Deng, PK Varshney… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general,
routing protocols for MANETs are designed based on the assumption that all participating …

Self-organized public-key management for mobile ad hoc networks

S Capkun, L Buttyan, JP Hubaux - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
In contrast with conventional networks, mobile ad hoc networks usually do not provide
online access to trusted authorities or to centralized servers, and they exhibit frequent …

[PDF][PDF] An overview of mobile ad hoc networks: applications and challenges

J Hoebeke, I Moerman, B Dhoedt… - Journal …, 2004 - researchgate.net
In the past few years, we have seen a rapid expansion in the field of mobile computing due
to the proliferation of inexpensive, widely available wireless devices. However, current …