2005
DOI: 10.1007/11599593_9
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Node Location in Clustered Multi-hop Wireless Networks

Abstract: Abstract:Ad hoc routing protocols proposed in the MANET working group are all flat routing protocols and are thus not suitable for large scale or very dense networks because of bandwidth and processing overheads they generate. A common solution to this scalability problem is to gather terminals into clusters and then to apply a hierarchical routing, which means, in most of the literature, using a proactive routing protocol inside the clusters and a reactive one between the clusters. We previously introduced a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 34 publications
0
13
0
Order By: Relevance
“…Clustering algorithms have been proposed to alleviate the aforementioned problems. Mitton et al [9] defines the density of a node as the ratio between the number of links within the node's 2-hop neighbors and the number of 2-hop neighbors. Nodes who have the local highest density are elected clusterhead.…”
Section: Related Workmentioning
confidence: 99%
“…Clustering algorithms have been proposed to alleviate the aforementioned problems. Mitton et al [9] defines the density of a node as the ratio between the number of links within the node's 2-hop neighbors and the number of 2-hop neighbors. Nodes who have the local highest density are elected clusterhead.…”
Section: Related Workmentioning
confidence: 99%
“…Features of mobile networks have allowed attackers to create new kinds of intrusions [1], [2]. These intrusions are more complex because they include all intrusions targeting wired networks, as well as attacks targeting the wireless environment.…”
Section: Introductionmentioning
confidence: 99%
“…This is due to the specific features of wireless networks, which allow the attackers to create new kinds of intrusions and anomalies. Therefore, new solutions and approaches that are more appropriate for detecting wireless DDoS have to be developed [1][2]. Intrusion detection systems deployed for protecting wired communications, base their detection on pattern matching and statistical anomaly approaches.…”
Section: Introductionmentioning
confidence: 99%