The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings, IEEE Aerospace Conference
DOI: 10.1109/aero.2002.1036113
|View full text |Cite
|
Sign up to set email alerts
|

TBONE: A mobile-backbone protocol for ad hoc wireless networks

Abstract: Ahstrort-We introduce an ad hoc wireless mobile network that employs a hierarchical networking architecture. The network uses high capacity and IOU, capacity nodes. We present a topological synthesis algorithm that selects a subset of high capacity nodes to fomi a backbone nehvork. The latter consists of interconnected backbone nodes that intercommunicate across high power links, and also makes use of (airhome, ground and underwater) Uiimanned Vehicles (UVs). Each backbone node manages the allocation of commun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(32 citation statements)
references
References 6 publications
0
31
0
1
Order By: Relevance
“…Most of these solutions deal with the detection of a single malicious node or require enormous resource in terms of time and cost for detecting co operative blackhole attacks. In addition, some of these methods require specific environments [5] or assumptions in order to operate. In general, detection mechanisms that have been proposed so far can be grouped into two broad categories.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Most of these solutions deal with the detection of a single malicious node or require enormous resource in terms of time and cost for detecting co operative blackhole attacks. In addition, some of these methods require specific environments [5] or assumptions in order to operate. In general, detection mechanisms that have been proposed so far can be grouped into two broad categories.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…The motivation for analyzing mobile backbone networks is discussed in detail in [6], [8], [9]. Srinivas et al [8] define two types of nodes, which may be thought of as representing robotic agents: regular nodes, which have limited mobility and communication capability, and mobile backbone nodes, which have greater communication capability than regular nodes and which can be placed at arbitrary locations in order to provide communication support for the regular nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Most of these solutions deal with the detection of a single malignant node or require enormous resource in terms of time and cost for detecting cooperative blackhole attacks. In addition, some of these methods require specific environments [4] or assumptions to operate. In general, detection mechanisms that have been proposed so far can be grouped into two broad categories.1) Proactive detection schemes [5]- [11] are schemes that need to constantly detect or monitor nearby nodes.…”
Section: Related Workmentioning
confidence: 99%