Learn More
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of position-based routing protocols. In this paper, we propose a(More)
— In this paper, we consider a mobile ad-hoc wireless access network in which mobile nodes can access the Internet via a stationary gateway node or access point. Mobile nodes that are outside the transmission range of the gateway can continue to communicate with the gateway via a multi-hop connection with their neighboring nodes. The Ad-hoc On-demand(More)
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security analysis. There has been a lack of work related to the performance of secure routing protocols in real network testbed. In this paper, we present quantitative results for the(More)
Wireless ad-hoc networks can experience significant performance degradation under fading channels. Diversity through space has been shown to be an effective way of combating wireless fading with the multiple-input-multiple-output (MIMO) technique by transmitting correlated information through multiple antennas. The virtual MIMO technique, which allows(More)
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, so far security issues in position-based routing protocols has not been widely considered. In this paper, we identify several(More)
Advances in mobile networks and positioning technologies have made location information a valuable asset in vehicular ad-hoc networks (VANETs). However, the availability of such information must be weighted against the potential for abuse. In this paper, we investigate the problem of alleviating unauthorized tracking of target vehicles by adversaries in(More)
  • 1