Ad hoc networks are to computing devices what Yahoo Personals are to single people: both help individuals communicate productively with strangers while maintaining security. Under the rules of ad hoc networking--which continue to evolve--your mobile phone can, when placed in proximity to your handheld address book, establish a little network on its own and enable data sharing between the two devices. In Ad Hoc Networking, Charles Perkins has compiled a series of technical papers about networking on the fly from a variety of laboratories and experts. The collection explains the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity. In this treatment, ad hoc networking covers a broad swath of situations. An ad hoc network might consist of several home-computing devices, plus a notebook computer that must exist on home and office networks without extra administrative work. Such a network might also need to exist when the people and equipment in normally unrelated military units need to work together in combat. Though the papers in this book are much more descriptive of protocols and algorithms than of their implementations, they aim individually and collectively at commercialization and popularization of mobile devices that make use of ad hoc networking. You'll enjoy this book if you're involved in researching or implementing ad hoc networking capabilities for mobile devices. --David Wall Topics covered: The state-of-the-art in protocols and algorithms to be used in ad hoc networks of mobile devices that move in and out of proximity to one another, to fixed resources like printers, and to Internet connectivity. Routing with Destination-Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector (AODV), and other resource-discovery and routing protocols; the effects of ad hoc networking on bandwidth consumption; and battery life.
Cited By
- Malwe S, Taneja N and Biswas G (2019). Enhancement of DSR and AODV Protocols Using Link Availability Prediction, Wireless Personal Communications: An International Journal, 97:3, (4451-4466), Online publication date: 1-Dec-2017.
- Kwon H, Kim D, Hahn C and Hur J (2017). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks, Multimedia Tools and Applications, 76:19, (19507-19521), Online publication date: 1-Oct-2017.
- Kurundkar S, Joshi S and Waghmare L (2017). Modeling and Statistical Analysis of Scenario Metric Parameters of Ad Hoc on Demand Distance Vector Routing Protocol, Wireless Personal Communications: An International Journal, 96:1, (183-197), Online publication date: 1-Sep-2017.
- Xu Y, Liu J, Shen Y, Li X and Jiang X (2017). On throughput capacity of large-scale ad hoc networks with realistic buffer constraint, Wireless Networks, 23:1, (193-204), Online publication date: 1-Jan-2017.
- Turkes O, Scholten H and Havinga P (2016). Cocoon, Computer Networks: The International Journal of Computer and Telecommunications Networking, 111:C, (93-108), Online publication date: 24-Dec-2016.
- Mirzazad-Barijough M and Garcia-Luna-Aceves J Making On-Demand Routing Efficient with Route-Request Aggregation Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, (239-246)
- Sheikholeslami A, Ghaderi M, Pishro-Nik H and Goeckel D (2016). Energy-Efficient Routing in Wireless Networks in the Presence of Jamming, IEEE Transactions on Wireless Communications, 15:10, (6828-6842), Online publication date: 1-Oct-2016.
- Kumar S and Dutta K (2016). Intrusion detection in mobile ad hoc networks, Security and Communication Networks, 9:14, (2484-2556), Online publication date: 25-Sep-2016.
- Kaliappan M, Augustine S and Paramasivan B (2016). Enhancing energy efficiency and load balancing in mobile ad hoc network using dynamic genetic algorithms, Journal of Network and Computer Applications, 73:C, (35-43), Online publication date: 1-Sep-2016.
- Vijayalakshmi P, Francis S and Abraham Dinakaran J (2016). A robust energy efficient ant colony optimization routing algorithm for multi-hop ad hoc networks in MANETs, Wireless Networks, 22:6, (2081-2100), Online publication date: 1-Aug-2016.
- Prabahkar V, Singh A and Raw R Hop Count Analysis of IE-DIR Protocol for VANETs in Wider City Traffic Scenario Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
- Xu Y, Sheng M, Liu J and Shi Y (2014). On the packet loss overhead in buffer-limited ad hoc networks, Wireless Networks, 20:6, (1653-1667), Online publication date: 1-Aug-2014.
- Kwon H, Hahn C, Kim D, Kang K and Hur J Secure Device-to-Device Authentication in Mobile Multi-hop Networks Proceedings of the 9th International Conference on Wireless Algorithms, Systems, and Applications - Volume 8491, (267-278)
- Dalal R, Khari M and Singh Y Authenticity check to provide trusted platform in MANET (ACTP) Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (647-655)
- Ott J, Keränen A and Hyytiä E BeachNet Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition, (1-6)
- Hurley S and Imran Khan M (2011). Netted radar, Ad Hoc Networks, 9:5, (736-751), Online publication date: 1-Jul-2011.
- Gaudou B, Hassas S and Armetta F A cluster-based approach for disturbed, spatialized, distributed information gathering systems Proceedings of the 13th international conference on Principles and Practice of Multi-Agent Systems, (588-603)
- Lakkakorpi J, Pitkänen M and Ott J Adaptive routing in mobile opportunistic networks Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems, (101-109)
- Fekete S, Schmidt C, Wegener A, Hellbrück H and Fischer S (2010). Empowered by wireless communication, ACM Transactions on Autonomous and Adaptive Systems, 5:3, (1-30), Online publication date: 1-Sep-2010.
- Chuang Y and Tseng Y (2010). An efficient dynamic group key agreement protocol for imbalanced wireless networks, International Journal of Network Management, 20:4, (167-180), Online publication date: 1-Jul-2010.
- Lass R, Macker J, Millar D and Taylor I GUMP Proceedings of the 2nd workshop on Bio-inspired algorithms for distributed systems, (39-46)
- Zhang C, Zhu X, Song Y and Fang Y A formal study of trust-based routing in wireless ad hoc networks Proceedings of the 29th conference on Information communications, (2838-2846)
- Park S and Yoo S Routing table maintenance in mobile ad hoc networks Proceedings of the 12th international conference on Advanced communication technology, (1321-1325)
- Wallentin L, Fabini J, Egger C and Happenhofer M A cross-layer route discovery strategy for virtual currency systems in mobile ad hoc networks Proceedings of the 7th international conference on Wireless on-demand network systems and services, (91-98)
- Seada K Mobile devices as an extension to the wireless infrastructure Proceedings of the 7th IEEE conference on Consumer communications and networking conference, (802-806)
- Sharif U, Khan A, Ahmed M, Anwar W and Khan A CLUSMA Proceedings of the 7th International Conference on Frontiers of Information Technology, (1-4)
- Barolli L, Mino G, Xhafa F, De Marco G, Durresi A and Koyama A Analysis of ad-hoc networks connectivity considering shadowing radio model Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, (464-468)
- Aschenbruck N, Gerhards-Padilla E and Martini P (2009). Modeling mobility in disaster area scenarios, Performance Evaluation, 66:12, (773-790), Online publication date: 1-Dec-2009.
- Younis M and Farrag O Tiered authentication of multicast traffic in wireless ad-hoc networks Proceedings of the 28th IEEE conference on Global telecommunications, (3793-3799)
- Barolli L, Koyama A, Honma Y, Durresi A and Arai J (2009). Performance evaluation of selective-border-casting zone routing protocol for ad-hoc networks, International Journal of Wireless and Mobile Computing, 3:4, (312-319), Online publication date: 1-Nov-2009.
- Wang C, Yu Y, Xu Y, Ma M and Diao S A multi-hop clustering protocol for MANETs Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (3038-3041)
- Li L, Lee G, Kang L and Mei J Construct the Load-Balanced Topology in NEMO Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, (100-111)
- Oka H and Higaki H (2009). Wireless multihop communication in sparse Vehicular Ad-Hoc Networks, International Journal of Internet Protocol Technology, 4:2, (115-125), Online publication date: 1-Jul-2009.
- Ge M and Lam K Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance, (392-401)
- Chinara S and Rath S (2009). A Survey on One-Hop Clustering Algorithms in Mobile Ad Hoc Networks, Journal of Network and Systems Management, 17:1-2, (183-207), Online publication date: 1-Jun-2009.
- Friedman R and Mori N 3DLS Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, (309-318)
- Rathod P, Dabeer O, Karandikar A and Sahoo A Characterizing the exit process of a non-saturated IEEE 802.11 wireless network Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, (249-258)
- Le V, Bouraqadi N, Stinckwich S, Moraru V and Doniec A Making networked robots connectivity-aware Proceedings of the 2009 IEEE international conference on Robotics and Automation, (1835-1840)
- EffatParvar M, Yazdani N, Lahooti F and EffatParvar M Link Stability Approach and Scalability Method on ODMRP in Ad Hoc Networks Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference, (416-421)
- Li X and Chong P (2009). A medium access control scheme for TDD-CDMA cellular networks with two-hop relay architecture, IEEE Transactions on Wireless Communications, 8:5, (2280-2285), Online publication date: 1-May-2009.
- Jawhar I A flexible object-oriented design of an event-driven wireless network simulator Proceedings of the 2009 conference on Wireless Telecommunications Symposium, (80-86)
- Jawhar I and Mohamed N A hierarchical and topological classification of linear sensor networks Proceedings of the 2009 conference on Wireless Telecommunications Symposium, (72-79)
- Xing B, Seada K and Venkatasubramanian N An experimental study on wi-fi ad-hoc mode for mobiledevice-to-device video delivery Proceedings of the 28th IEEE international conference on Computer Communications Workshops, (170-175)
- Sakamoto D and Higaki H Wireless multihop transmission with buffering in neighbor sensor nodes for shorter delay Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (2708-2713)
- Yang W and Wang L (2009). The investigation of delay-constrained multicasting with minimum-energy consumption in static ad hoc wireless networks, International Journal of Ad Hoc and Ubiquitous Computing, 4:3/4, (237-250), Online publication date: 1-Apr-2009.
- Safa H, Artail H and Shibli R (2009). An interoperability model for supporting reliability and power-efficient routing in MANETs, International Journal of Ad Hoc and Ubiquitous Computing, 4:2, (71-83), Online publication date: 1-Mar-2009.
- Kaosar M and Sheltami T (2009). Voice transmission over ad hoc network adapting optimum approaches to maximize the performance, Computer Communications, 32:4, (634-639), Online publication date: 1-Mar-2009.
- Ni C, Park C, Jin D, Kim J and Kim C The effects of energy-balancing on multipaths by packet allocating in ad hoc networks Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1, (667-672)
- Vithoft M, Santin A and de Paula Lima L A management service for P2P content over MANets Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1, (661-666)
- Jang K, Yang H and Rhee J Cluster overlay-dynamic source routing Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3, (1524-1528)
- Pham N and Choo H Efficient location-aided flooding scheme initiated by receiver for MANETs Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, (194-199)
- Jutao H, Jingjing Z and Minglu L (2009). Energy level and link state aware AODV route request forwarding mechanism research, WSEAS TRANSACTIONS on COMMUNICATIONS, 8:2, (290-299), Online publication date: 1-Feb-2009.
- Bohdanowicz F, Dickel H and Steigner C Detection of routing loops Proceedings of the 23rd international conference on Information Networking, (230-234)
- Lee J, Ahn S, Yu H, Kim Y and Jin J Address autoconfiguration and route determination mechanisms for the MANET architecture overcoming the multi-link subnet model Proceedings of the 23rd international conference on Information Networking, (122-126)
- Cheng C, Wang S and Liang T (2008). Byzantine Agreement & Fault Diagnosis Agreement in Dynamic Ad-Hoc Environment, Fundamenta Informaticae, 89:2-3, (161-187), Online publication date: 15-Jan-2009.
- Gavalas D, Pantziou G, Konstantopoulos C and Mamalis B (2008). ABP: a low-cost, energy-efficient clustering algorithm for relatively static and quasi-static MANETs, International Journal of Sensor Networks, 4:4, (260-269), Online publication date: 1-Jan-2009.
- Elhdhili M, Azzouz L and Kamoun F (2009). REputation based Clustering Algorithm for security management in ad hoc networks with liars, International Journal of Information and Computer Security, 3:3/4, (228-244), Online publication date: 1-Jan-2009.
- Badarneh O and Kadoch M (2009). Multicast routing protocols in mobile ad hoc networks, EURASIP Journal on Wireless Communications and Networking, 2009, (1-42), Online publication date: 1-Jan-2009.
- Seada K Insights from a freeway car-to-car real-world experiment Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization, (49-56)
- Safa H, Artail H and Nahhas M Enhancing cache invalidation in mobile environments Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-8)
- Tamilarasi M and Palanivelu T (2018). A strategy to reduce the control packet load of MANETs with bidirectional links using DSR, International Journal of Network Management, 18:4, (363-374), Online publication date: 1-Aug-2008.
- Lass R, Sultanik E and Regli W Dynamic distributed constraint reasoning Proceedings of the 23rd national conference on Artificial intelligence - Volume 3, (1466-1469)
- Espensen K, Kjeldsen M and Kristensen L Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks Proceedings of the 29th international conference on Applications and Theory of Petri Nets, (152-170)
- Cheng C, Wang S and Liang T (2019). Byzantine Agreement & Fault Diagnosis Agreement in Dynamic Ad-Hoc Environment, Fundamenta Informaticae, 89:2-3, (161-187), Online publication date: 1-Apr-2008.
- Costa P, Gavidia D, Koldehofe B, Miranda H, Musolesi M and Riva O When cars start gossiping Proceedings of the 6th workshop on Middleware for network eccentric and mobile applications, (1-4)
- Durocher S, Kirkpatrick D and Narayanan L On routing with guaranteed delivery in three-dimensional ad hoc wireless networks Proceedings of the 9th international conference on Distributed computing and networking, (546-557)
- Rehman S, Song W, Lee J, Park G and Lutfiyya H Associativity-based adaptive weighted clustering for large-scale mobile ad hoc networks Proceedings of the 19th IASTED International Conference on Parallel and Distributed Computing and Systems, (30-35)
- Aschenbruck N, Gerhards-Padilla E, Gerharz M, Frank M and Martini P Modelling mobility in disaster area scenarios Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, (4-12)
- Baccarelli E, Biagi M, Pelizzoni C and Cordeschi N Multi-antenna cognitive radio for broadband access in 4G-WLANs Proceedings of the 5th ACM international workshop on Mobility management and wireless access, (66-73)
- Shafqat-ur-Rehman S, Song W, Park G and Lee J Cross layer based PBNM for mobile ad hoc networks with vector information in XML Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services, (165-174)
- Safa H, Artail H, Hamze H and Mershad K A collaborative service discovery and service sharing framework for mobile ad hoc networks Proceedings of the 2007 IFIP international conference on Network and parallel computing, (151-160)
- Choi Y, Jun J and Bahk S (2019). Profit-Based Routing for Multihop Coverage Extension in Wireless Networks, Wireless Personal Communications: An International Journal, 42:4, (465-478), Online publication date: 1-Sep-2007.
- Vergados D, Pantazis N and Vergados D Enhanced route selection for energy efficiency in wireless sensor networks Proceedings of the 3rd international conference on Mobile multimedia communications, (1-6)
- Manickam J, Bhuvaneswari R, Bhagyaveni M and Shanmugavel S Secure routing protocol for mobile ad-hoc networks Proceedings of the 2007 Summer Computer Simulation Conference, (725-731)
- Moh S Adaptive multicast trees on static ad hoc networks Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing, (267-275)
- Gelenbe E (2007). A diffusion model for packet travel time in a random multihop medium, ACM Transactions on Sensor Networks, 3:2, (10-es), Online publication date: 1-Jun-2007.
- Rindler F, Kubisch M, Carlson E and Hollos D On the Proper Interference Protection in Wireless Multi-Hop Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (452-457)
- Chai Z, Cao Z and Zhou Y (2007). Efficient ID-based multi-decrypter encryption with short ciphertexts, Journal of Computer Science and Technology, 22:1, (103-108), Online publication date: 1-Jan-2007.
- Shahbazi S, Ghassem-Sani G, Rabiee H, Ghanbari M and Dehghan M ADIAN Proceedings of the 8th international conference on Distributed Computing and Networking, (27-39)
- Kwon J, Jeong I and Lee D Provably-Secure two-round password-authenticated group key exchange in the standard model Proceedings of the 1st international conference on Security, (322-336)
- Nurmi P Modeling energy constrained routing in selfish ad hoc networks Proceeding from the 2006 workshop on Game theory for communications and networks, (6-es)
- Seredynski M, Bouvry P and Klopotek M Evolution of cooperation in ad hoc networks under game theoretic model Proceedings of the 4th ACM international workshop on Mobility management and wireless access, (126-130)
- Panichpapiboon S, Ferrari G and Tonguz O (2006). Optimal Transmit Power in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, 5:10, (1432-1447), Online publication date: 1-Oct-2006.
- Huang J, Chuang S and Wang S Transmission range designation broadcasting methods for wireless ad hoc networks Proceedings of the Third international conference on Ubiquitous Intelligence and Computing, (312-321)
- Bonifaci V, Korteweg P, Marchetti-Spaccamela A and Stougie L An approximation algorithm for the wireless gathering problem Proceedings of the 10th Scandinavian conference on Algorithm Theory, (328-338)
- Kim D, Ha R and Cha H Traffic load and lifetime deviation based power-aware routing protocol for wireless ad hoc networks Proceedings of the 4th international conference on Wired/Wireless Internet Communications, (325-336)
- Kumar S, Raghavan V and Deng J (2006). Medium Access Control protocols for ad hoc wireless networks, Ad Hoc Networks, 4:3, (326-358), Online publication date: 1-May-2006.
- Wu B and Wu J k-anycast routing schemes for mobile ad hoc networks Proceedings of the 20th international conference on Parallel and distributed processing, (129-129)
- Hu J and Burmester M LARS Proceedings of the 44th annual ACM Southeast Conference, (119-123)
- Ghosh R, Garg V, Meitei M, Raman S, Kumar A and Tewari N (2006). Dense cluster gateway based routing protocol for multi-hop mobile ad hoc networks, Ad Hoc Networks, 4:2, (168-185), Online publication date: 1-Mar-2006.
- Boukerche A, Chatzigiannakis I and Nikoletseas S (2006). A new energy efficient and fault-tolerant protocol for data propagation in smart dust networks using varying transmission range, Computer Communications, 29:4, (477-489), Online publication date: 1-Feb-2006.
- Schindelhauer C Mobility in wireless networks Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science, (100-116)
- Birk A and Condea C Mobile robot communication without the drawbacks of wireless networking RoboCup 2005, (585-592)
- Rooker M and Birk A Communicative exploration with robot packs RoboCup 2005, (267-278)
- Mitton N and Fleury E Distributed node location in clustered multi-hop wireless networks Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks, (112-127)
- Kristensen L, Westergaard M and Nørgaard P Model-Based prototyping of an interoperability protocol for mobile ad-hoc networks Proceedings of the 5th international conference on Integrated Formal Methods, (266-286)
- Gavalas D, Pantziou G, Konstantopoulos C and Mamalis B Efficient active clustering of mobile ad-hoc networks Proceedings of the 10th Panhellenic conference on Advances in Informatics, (820-827)
- Essmann B and Hampel T A design pattern for mobile-distributed knowledge spaces Proceedings of the 2005 symposia on Metainformatics, (3-es)
- Lee D, Cho Y and Lee S MANET address assignment protocol that use cluster Proceedings of the 7th WSEAS International Conference on Mathematical Methods and Computational Techniques In Electrical Engineering, (110-115)
- Vaios A and Stavrakakis I Triggering wireless network flashes Proceedings of the 2005 ACM conference on Emerging network experiment and technology, (296-297)
- Badonnel R, State R and Festor O (2018). Management of mobile ad hoc networks, International Journal of Network Management, 15:5, (335-347), Online publication date: 1-Sep-2005.
- Zhong S, Li L, Liu Y and Yang Y On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks Proceedings of the 11th annual international conference on Mobile computing and networking, (117-131)
- Ye Q, Zhang Y and Cheng L (2005). A study on the optimal time synchronization accuracy in wireless sensor networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 48:4, (549-566), Online publication date: 15-Jul-2005.
- Ni Y, Kremer U, Stere A and Iftode L Programming ad-hoc networks of mobile and resource-constrained devices Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, (249-260)
- Ni Y, Kremer U, Stere A and Iftode L (2005). Programming ad-hoc networks of mobile and resource-constrained devices, ACM SIGPLAN Notices, 40:6, (249-260), Online publication date: 12-Jun-2005.
- Wu H, Wang C and Tzeng N (2005). Novel self-configurable positioning technique for multihop wireless networks, IEEE/ACM Transactions on Networking (TON), 13:3, (609-621), Online publication date: 1-Jun-2005.
- Gerla M, Chen L, Lee Y, Zhou B, Chen J, Yang G and Das S Dealing with node mobility in ad hoc wireless network Proceedings of the 5th international conference on Formal Methods for the Design of Computer, Communication, and Software Systems: mobile computing, (69-106)
- Moh S Energy consumption in multicast protocols for static ad hoc networks Proceedings of the 4th international conference on Networking - Volume Part II, (369-376)
- Li G and Han W A new scheme for key management in ad hoc networks Proceedings of the 4th international conference on Networking - Volume Part II, (242-249)
- Speicher S and Cap C Candidate discovery for connected mobile ad hoc networks Proceedings of the 4th international conference on Networking - Volume Part II, (99-106)
- Rieck M, Pai S and Dhar S (2005). Distributed routing algorithms for multi-hop ad hoc networks using d-hop connected d-dominating sets, Computer Networks: The International Journal of Computer and Telecommunications Networking, 47:6, (785-799), Online publication date: 1-Apr-2005.
- Srinivasan S A Thin Storage Architecture for Wireless Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, (163-167)
- Choi D, Jung J, Kwon K, Montgomery D and Kahng H Design and simulation result of a weighted load aware routing (WLAR) protocol in mobile ad hoc network Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking, (178-187)
- Rooker M and Birk A Combining exploration and ad-hoc networking in robocup rescue RoboCup 2004, (236-246)
- Choudhary S, Gore M and Vyas O Path stability based adaptation of MANET routing protocols Proceedings of the 6th international conference on Distributed Computing, (198-203)
- Park S, Shin S and Lim G Active information based RRK routing for mobile ad hoc network Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (342-350)
- Carbunar B, Ioannidis I and Nita-Rotaru C JANUS Proceedings of the 3rd ACM workshop on Wireless security, (11-20)
- Kargl F, Klenk A, Schlott S and Weber M Advanced detection of selfish or malicious nodes in ad hoc networks Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (152-165)
- Goldenberg D, Lin J, Morse A, Rosen B and Yang Y Towards mobility as a network control primitive Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing, (163-174)
- Boukerche A and Nikoletseas S Protocols for data propagation in wireless sensor networks Wireless communications systems and networks, (23-51)
- Li L and Sinha P Throughput and energy efficiency in topology-controlled multi-hop wireless sensor networks Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, (132-140)
- Niculescu D and Nath B Trajectory based forwarding and its applications Proceedings of the 9th annual international conference on Mobile computing and networking, (260-272)
- Busch C, Surapaneni S and Tirthapura S Analysis of link reversal routing algorithms for mobile ad hoc networks Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures, (210-219)
- Kang H and Kim K Design of mobile IP extension for nested mobile network Proceedings of the 2003 international conference on Computational science and its applications: PartII, (163-170)
- Cai Z, Lu M and Wang X (2003). Channel Access-Based Self-Organized Clustering in Ad Hoc Networks, IEEE Transactions on Mobile Computing, 2:2, (102-113), Online publication date: 1-Apr-2003.
- Boukerche A and Notare M (2019). Editorial, Journal of Parallel and Distributed Computing, 63:2, (107-109), Online publication date: 1-Feb-2003.
- Barrière L, Fraigniaud P, Narayanan L and Opatrny J Dynamic construction of Bluetooth scatternets of fixed degree and low diameter Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, (781-790)
- Chatzigiannakis I, Nikoletseas S and Spirakis P Smart dust protocols for local detection and propagation Proceedings of the second ACM international workshop on Principles of mobile computing, (9-16)
- Srivastava S and Ghosh R Cluster based routing using a k-tree core backbone for mobile ad hoc networks Proceedings of the 6th international workshop on Discrete algorithms and methods for mobile computing and communications, (14-23)
- Giordano S Mobile ad hoc networks Handbook of wireless networks and mobile computing, (325-346)
- Bettstetter C and Krausser R Scenario-based stability anlysis of the distributed mobility-adaptive clustering (DMAC) algorithm Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (232-241)
- Law C, Mehta A and Siu K Performance of a new Bluetooth scatternet formation protocol Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (183-192)
- Li L, Halpern J, Bahl P, Wang Y and Wattenhofer R Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks Proceedings of the twentieth annual ACM symposium on Principles of distributed computing, (264-273)
Index Terms
- Ad Hoc Networking
Recommendations
Remarks on ad hoc networking
Advanced lectures on networkingThis papers describes selected problems and solutions for ad hoc networking, namely, for networking in absence of a fixed infrastructure. All nodes of an ad hoc networks move freely and communicate with each other only if they are in each other ...
Multihop wireless ad hoc networking: current challenges and future opportunities
ISPA'04: Proceedings of the Second international conference on Parallel and Distributed Processing and ApplicationsAn ad hoc network is a collection of wireless mobile nodes that form a network without existing infrastructure or centralized administration. Nodes in the network cooperate to forward packets for each other, to allow mobile nodes not within direct ...