GTA-m: greedy trajectory-aware (m copies) routing for airborne networks
Abstract
References
Index Terms
- GTA-m: greedy trajectory-aware (m copies) routing for airborne networks
Recommendations
Implementation of data privacy between nodes using AES in wireless ad hoc networks
ANC '13: Proceedings of the second ACM MobiHoc workshop on Airborne networks and communicationsWireless as hoc networks consist of Computer Nodes with radio transceivers, which allow the nodes to send and receive data over the air. This provides for the mobility of the nodes. Any information sent over the air is susceptible to interception. This ...
Simulating large-scale airborne networks with ns-3
WNS3 '15: Proceedings of the 2015 Workshop on ns-3Large-scale airborne networks, which connect airborne nodes with high-bandwidth communication links are being actively pursued commercially. We propose utilizing thousands of operational passenger and cargo aircraft as the principal components of an ...
Analysis of Topology Algorithms for Commercial Airborne Networks
ICNP '14: Proceedings of the 2014 IEEE 22nd International Conference on Network ProtocolsCivilian Airborne Networks capable of providing network connectivity to users onboard aircraft and users on the ground may soon be viable. We propose a novel airborne network architecture consisting of commercial aircraft and ground station gateways ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/2e9853dd-8099-4a76-a974-8e5119cdfa2f/2636582.cover.jpg)
- Program Chairs:
- Kamesh Namuduri,
- Yan Wan,
- Mahadevan Gomathisankaran
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 118Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in