Academic literature on the topic 'Mobile Ad Hoc Networks (MANETs)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile Ad Hoc Networks (MANETs).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile Ad Hoc Networks (MANETs)"

1

Singh, Gurvir, and Tajinder Kaur. "Termite-Based Approach for Wormhole Attack Detection in Mobile Ad-Hoc Networks (MANETs)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42378.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are regular, self-orbiting communication networks that may control mobile nodes. Many protocols have been developed to alleviate the MANET's susceptibility to different risks & attacks. When nodes are mobile or the network architecture is unstable, the hostile node exploits these flaws to initiate assaults, including wormhole assaults. This study presents the termite approach for wormhole detection in MANETs. Keywords: MANET, Denial of service, Wormhole attack, Termite approach
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Sunil, and Kamlesh Dutta. "Securing Mobile Ad Hoc Networks." International Journal of Handheld Computing Research 7, no. 1 (2016): 26–76. http://dx.doi.org/10.4018/ijhcr.2016010103.

Full text
Abstract:
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for various types of applications such as military communication, emergency search and rescue operations, disaster recovery, battlefields, communication between moving vehicles (VANET etc. However, MANETs are highly susceptible to various security threats due to their inherent characteristics that can adversely affect their performance. In order to provide secure communication in mobile ad hoc networks, it is required to understand various possible attacks at different layers of the communication protocol stac
APA, Harvard, Vancouver, ISO, and other styles
3

Chauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.

Full text
Abstract:
Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc network
APA, Harvard, Vancouver, ISO, and other styles
4

Filipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.

Full text
Abstract:
Abstract Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and routes traffic throughout the network. Compromising one node can hugely affect n
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Kirti, and Poonam Yadav. "Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (2012): 351–53. http://dx.doi.org/10.24297/ijct.v3i3a.2937.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are one of the best ever growing areas of research. By providing communications in the absence of fixed infrastructure MANETs are an attractive technology. However this edibility introduces new security threats. The traditional way of protecting networks is not directly applicable to MANETs. Many conventional security solutions are ineffective and inefficient for the highly dynamic and resource-constrained environments where MANET use might be expected. In this paper we solving security issue in Mobile Adhoc Network using Evolutionary Computation that will be d
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. This paper presents the enhanced attack trees for MANET attacks, which is completed by extending the basic attack trees. The enhanced attack trees add the types between nodes and the attributes of nodes. Finally this paper shows how to represent the Block hole attacks in MANETs by means of the enhanced attack trees.
APA, Harvard, Vancouver, ISO, and other styles
7

Islam, Burhan Ul, Rashidah Funke Olanrewaju, Farhat Anwar, Athaur Rahman Najeeb, and Mashkuri Yaacob. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp832-842.

Full text
Abstract:
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept
APA, Harvard, Vancouver, ISO, and other styles
8

Burhan, Ul Islam Khan, Funke Olanrewaju Rashidah, Anwar Farhat, Rahman Najeeb Athaur, and Yaacob Mashkuri. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832–42. https://doi.org/10.11591/ijeecs.v12.i2.pp832-842.

Full text
Abstract:
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept
APA, Harvard, Vancouver, ISO, and other styles
9

Shreya Mane. "Conceptual Aspects on Mobile Ad-Hoc Network System." international journal of engineering technology and management sciences 6, no. 6 (2022): 555–64. http://dx.doi.org/10.46647/ijetms.2022.v06i06.095.

Full text
Abstract:
A mobile ad hoc network is made up of mobile wireless hosts. When hosts move, the routes change, necessitating the need for a system to find new routes. A crucial aspect of the development of wireless networks is ad-hoc networking. Ad-hoc networks often consist of identical nodes that connect with one another via wireless links without the use of a centralized controller. Ad-hoc wireless networks carry over the standard issues with wireless and mobile communications, like bandwidth optimization, battery management, and improvement of transmission quality. Due to its self-upkeep and self-config
APA, Harvard, Vancouver, ISO, and other styles
10

Kanellopoulos, Dimitris, and Francesca Cuomo. "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks." Electronics 10, no. 4 (2021): 364. http://dx.doi.org/10.3390/electronics10040364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Mobile Ad Hoc Networks (MANETs)"

1

Lu, Bin. "Quality of Service (QoS) security in mobile ad hoc networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4295.

Full text
Abstract:
With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS provisioning in the MANET environment. Without protection from a security mechanism, attacks on QoS signaling system could result in QoS routing malfunction, interference of resource reservation, or even failure of QoS provision. Due to the characteristics of the MANETs, such as rapid topology change and limited communication and computation capacity, the conventional security mea
APA, Harvard, Vancouver, ISO, and other styles
2

Abdulai, Jamal-deen. "Probabilistic route discovery for Wireless Mobile Ad Hoc Networks (MANETs)." Thesis, University of Glasgow, 2009. http://theses.gla.ac.uk/719/.

Full text
Abstract:
Mobile wireless ad hoc networks (MANETs) have become of increasing interest in view of their promise to extend connectivity beyond traditional fixed infrastructure networks. In MANETs, the task of routing is distributed among network nodes which act as both end points and routers in a wireless multi-hop network environment. To discover a route to a specific destination node, existing on-demand routing protocols employ a broadcast scheme referred to as simple flooding whereby a route request packet (RREQ) originating from a source node is blindly disseminated to the rest of the network nodes. T
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Sung Jin. "Performance improvement in mobile ad-hoc networks." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45903.

Full text
Abstract:
The objective of this research is to enhance the network performance under realistic mobile ad-hoc networks environments without modification of the standard. Overview of this research is summarized as follows: First, a packet-fragmentation technique to improve network throughput under the worst channel conditions is proposed. While the conventional packet-fragmentation technique research focuses only on random-bit errors, the proposed technique employs both random bit errors and hidden-node collisions. The analytical models based on Markov-chain model shows that the optimal fragmentation t
APA, Harvard, Vancouver, ISO, and other styles
4

Kioumourtzis, Georgios A. "Simulation and evaluation of routing protocols for Mobile Ad Hoc Networks (MANETs)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FKioumourtzis.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering and M.S. in Computer Science)--Naval Postgraduate School, September 2005.<br>Thesis Advisor(s): Gilbert M. Lundy, Rex Buddenberg. Includes bibliographical references (p.133-135). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
5

Córdova, Morales David Alexis. "Blockchain Application for Mesh and Mobile Ad Hoc Networks." Electronic Thesis or Diss., Sorbonne université, 2022. https://theses.hal.science/tel-03922843.

Full text
Abstract:
La blockchain est une technologie qui permet de maintenir un unique registre d’information de façon décentralisé et distribué tout en garantissant la sécurité des données. Cette technologie, qui est à l’origine de la cryptomonnaie la plus populaire, le Bitcoin, est en train de changer la façon dont nous concevons les registres d’informations dans les systèmes distribués. En effet, l’ensemble des fonctions cryptographiques ainsi que la nature distribuée de la technologie font de la blockchain, un des outils les plus sécurisés de nos jours pour maintenir un registre de l’information. Les premièr
APA, Harvard, Vancouver, ISO, and other styles
6

Gossain, Hrishikesh. "Power Control and Spatial Reusability in Mobile Ad Hoc Networks." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1115308673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Kavitha. "Intrusion Detection in Mobile Adhoc Networks." Connect to full text in OhioLINK ETD Center, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1260232844.

Full text
Abstract:
Thesis (M.S.)--University of Toledo, 2009.<br>Typescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Bibliography: leaves 80-84.
APA, Harvard, Vancouver, ISO, and other styles
8

Holland, Gavin Douglas. "Adaptive protocols for mobile ad hoc networks." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1445.

Full text
Abstract:
Recent advances in low-power technologies have resulted in the proliferation of inexpensive handheld mobile computing devices. Soon, just like the Internet empow- ered a whole new world of applications for personal computers, the development and deployment of robust ubiquitous wireless networks will enable many new and exciting futuristic applications. Certain to be an important part of this future is a class of networks known as "mobile ad hoc networks." Mobile ad hoc networks (or simply "ad hoc networks") are local-area networks formed "on the spot" between collocated wireless devices. These
APA, Harvard, Vancouver, ISO, and other styles
9

Said, Roméo. "Middleware for service provision in disconnected mobile ad hoc networks." Lorient, 2011. http://www.theses.fr/2011LORIS224.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are spontaneously formed out of a number of mobile devices that communicate thanks to short-range wireless communication capabilities (e. G. Wi-Fi, Bluetooth). In many ad hoc networks deployed in real conditions, mobile nodes can exhibit highly dynamic behaviors of mobility and volatility. Because of their behavior, the devices in such network environments form so-called "islands" whose topology evolves continuously, rather than a single fully connected network. In this work, I focus on this class of MANETs which I refer to as disconnected MANETs. Network-wide c
APA, Harvard, Vancouver, ISO, and other styles
10

Gallina, Lucia <1984&gt. "Formal models for qualitative and quantitative analysis of mobile ad hoc and sensor networks." Doctoral thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3045.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are systems of mobile devices communicating with each other through wireless links without a pre-established networking infrastructure. The absence of a central infrastructure, together with the heterogeneous nature of the devices, make this kind of networks particularly fit to face critical situations, such as natural disasters or battlefield environments. Connectivity, energy consumption and communication interference are key aspects in mobile ad-hoc networks, due to the dynamic characteristics of the devices. In this thesis we propose a broadcast process alge
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Mobile Ad Hoc Networks (MANETs)"

1

TAVLI, BULENT, and WENDI HEINZELMAN, eds. MOBILE AD HOC NETWORKS. Springer Netherlands, 2006. http://dx.doi.org/10.1007/1-4020-4633-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

1965-, Basagni Stefano, ed. Mobile ad hoc networking. John Wiley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nikolaidis, Ioanis, and Kui Wu, eds. Ad-Hoc, Mobile and Wireless Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14785-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kranakis, Evangelos, and Jaroslav Opatrny, eds. Ad-Hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74823-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Puliafito, Antonio, Dario Bruneo, Salvatore Distefano, and Francesco Longo, eds. Ad-hoc, Mobile, and Wireless Networks. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67910-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grieco, Luigi Alfredo, Gennaro Boggia, Giuseppe Piro, Yaser Jararweh, and Claudia Campolo, eds. Ad-Hoc, Mobile, and Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61746-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Hongke, Stephan Olariu, Jiannong Cao, and David B. Johnson, eds. Mobile Ad-Hoc and Sensor Networks. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77024-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Syrotiuk, Violet R., and Edgar Chávez, eds. Ad-Hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Frey, Hannes, Xu Li, and Stefan Ruehrup, eds. Ad-hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22450-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kunz, Thomas, and S. S. Ravi, eds. Ad-Hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11814764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Mobile Ad Hoc Networks (MANETs)"

1

Conceição, Luís, and Marilia Curado. "Smart and Balanced Clustering for MANETs." In Ad-hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22450-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Macker, Joseph P., and M. Scott Corson. "Mobile Ad Hoc Networks (MANETs): Routing Technology for Dynamic Wireless Networking." In Mobile Ad Hoc Networking. John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471656895.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Macaluso, Irene, Timothy K. Forde, Oliver Holland, and Keith E. Nolan. "Environment–Mobility Interaction Mapping for Cognitive MANETs." In Cognitive Radio Mobile Ad Hoc Networks. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6172-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vadde, Kiran K., and Violet R. Syrotiuk. "On Timers of Routing Protocols in MANETs." In Ad-Hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-28634-9_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Colbourn, Charles J., Violet R. Syrotiuk, and Alan C. H. Ling. "Steiner Systems for Topology-Transparent Access Control in MANETs." In Ad-Hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39611-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Lokesh, Chhagan Lal, and D. P. Sharma. "Improving QoE Using Link Stability for Video Streaming in MANETs." In Ad-hoc, Mobile, and Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40509-4_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bohrloch, Tim, Carlos T. Calafate, Álvaro Torres, Juan-Carlos Cano, and Pietro Manzoni. "A Methodology to Evaluate Video Streaming Performance in 802.11e Based MANETs." In Ad-hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22450-8_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qin, Liang, and Thomas Kunz. "On-demand Routing in MANETs: The Impact of a Realistic Physical Layer Model." In Ad-Hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39611-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Leite, J. R. E., Paulo S. Martins, and Edson L. Ursini. "A Validation Method for AdHoc Network Simulation Including MANETs, VANETs and Emergency Scenarios." In Ad-Hoc, Mobile, and Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31831-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Yongwei, and Mukesh Singhal. "LSTOP: A Light-Weight Scalable Truthful Routing Protocol in MANETs with Selfish Nodes." In Ad-Hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11814764_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile Ad Hoc Networks (MANETs)"

1

Afifah, Nurul, Muhammad Fadli, Tri Wanda Septian, Winda Kurnia Sari, Adi Hermansyah, and Mastura Diana Marieska. "Black Hole Attacks Detection in Mobile Ad Hoc Networks (MANETs) using Bayesian Inference Method." In 2024 11th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI). IEEE, 2024. https://doi.org/10.1109/eecsi63442.2024.10776143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gopinath, S., Chairman M, N. A. Natraj, and R. Sarankumar. "BDSCRP: Blockchain Based Dynamic Secure Cluster Routing Protocol for Mobile Ad hoc Networks (MANETs)." In 2025 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2025. https://doi.org/10.1109/icict64420.2025.11005260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

More, Aparna P., Rohini S. Kale, and M. A. Rizvi. "Optimization of Performance Parameters in Mobile Ad-hoc Networks (MANETs) using Hybrid Genetic Algorithm (GA)." In 2024 Third International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT). IEEE, 2024. http://dx.doi.org/10.1109/iceeict61591.2024.10718572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shivarudra, Ashwini, Gopal Kumar Gupta, Santhosh Vijayabaskar, Murali Mohana Krishna Dandu, Sheenu Agarwal, and Sachin Bhatt. "Developing a Secure, Trust-Based, and Energy-Efficient Hybrid Protocol for Mobile Ad Hoc Networks (MANETs)." In 2024 7th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2024. https://doi.org/10.1109/ic3i61595.2024.10829155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alshamrani, Mazin. "SIP over Next Generation mobile ad hoc networks (MANETs)." In 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2013. http://dx.doi.org/10.1109/wowmom.2013.6583433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kaur, Kirandeep, and Satinder Kaur. "A Brief Review of Energy Efficient Protocols in Mobile Ad hoc Networks." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.36.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) is an assemblage of multi-hop wireless mobile nodes that communicate with each other without centralized control and established infrastructure. Energy efficient routing is not merely concerned about less power consumption, it also deals with increasing the time duration in which any network maintains certain performance level. Therefore, power management becomes an essential issue. Considering this, various authors have designed and developed different techniques to enhance the energy efficiency of mobile networks. This paper focuses on the comparative study of
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Jane Y., Peter H. J. Chong, and Mingyang Zhang. "Performance of Efficient CBRP in Mobile Ad Hoc Networks (MANETS)." In 2008 IEEE 68th Vehicular Technology Conference (VTC 2008-Fall). IEEE, 2008. http://dx.doi.org/10.1109/vetecf.2008.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ghalwash, Atef Z., Aliaa A. A. Youssif, Sherif M. Hashad, and Robin Doss. "Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs)." In 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icis.2007.163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kathiravan, K., V. Divya, and S. Thamarai Selvi. "Energy Efficient Integrated Routing Protocol for MANETs." In 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks. IEEE, 2009. http://dx.doi.org/10.1109/msn.2009.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hang Zhao and S. M. Bellovin. "High Performance Firewalls in MANETs." In 2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2010). IEEE, 2010. http://dx.doi.org/10.1109/msn.2010.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mobile Ad Hoc Networks (MANETs)"

1

Clausen, T., C. Dearlove, and B. Adamson. Jitter Considerations in Mobile Ad Hoc Networks (MANETs). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clausen, T., and C. Dearlove. Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Peacock, Brent A. Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada497761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Herberg, U., and T. Clausen. Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Herberg, U., T. Clausen, and C. Dearlove. Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Joneckis, Lance, Corinne Kramer, David Sparrow, and David Tate. Modeling Terrain Impact on Mobile Ad Hoc Networks (MANET) Connectivity. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada613291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Clausen, T., C. Dearlove, J. Dean, and C. Adjih. Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chakeres, I. IANA Allocations for Mobile Ad Hoc Network (MANET) Protocols. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Clausen, T., C. Dearlove, and J. Dean. Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Macker, Joseph P., Justin W. Dean, Ronald D. Lee, Robert B. Adamson, Ian Taylor, and Andrew Harrison. Distributed Service Discovery within Mobile Ad Hoc Networks. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada550313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!