scispace - formally typeset
Open Access

The dynamic source routing protocol for mobile ad-hoc networks

J. Broach
Reads0
Chats0
About
The article was published on 1998-01-01 and is currently open access. It has received 1501 citations till now. The article focuses on the topics: Optimized Link State Routing Protocol & Ad hoc wireless distribution service.

read more

Citations
More filters
Proceedings ArticleDOI

Towards adaptive intrusion detection in mobile ad hoc networks

TL;DR: This paper demonstrates that nodes' moving speed is not an effective metric for the performance measurement of IDSs for MANETs, and proposes a new feature - the link change rate, which can not only act as a unified metric in measuring MANET IDS performance, but also be used to facilitate local MANETIDSs to select normal profiles adaptively.
Proceedings ArticleDOI

MANET: possible applications with PDA in wireless imaging environment

TL;DR: This work identifies some possible fields of application for such wireless systems, identifying advantages and drawbacks and presents a prototype application where MANETs are used in order to provide a distributed image processing service.
Proceedings ArticleDOI

Securing quality-of-service route discovery in on-demand routing for ad hoc networks

TL;DR: SQoS, a secure form of QoS-Guided Route Discovery for on-demand ad~hoc network routing, and limits this overhead to be linear in the number of network nodes by providing the source with control over which Route Requests are forwarded.
Proceedings ArticleDOI

Optimal rate allocation and traffic splits for energy efficient routing in ad hoc networks

TL;DR: This paper presents a primal formulation of the problem of energy efficiency in ad hoc wireless networks, which uses penalty functions to take into account the system constraints, and introduces a new methodology for solving the problem.

Active coordination in ad hoc networks

TL;DR: The EgoSpaces middleware model as mentioned in this paper addresses the needs of individual applications, allowing them to define what data is included in their operating context using declarative specifications constraining properties of data, agents that own data, hosts where agents are running and attributes of the network.