From the Publisher: The authoritative guide to the state of the art in ad hoc wireless networking. Reflects the field's latest breakthroughs Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much more Includes a complete narration of prototype implementation with communication performance results from practical field trials Introduces key applications for home, business, auto, and defense "Ad hoc" wireless networks eliminate the complexities of infrastructure setup and administration, enabling devices to create and join networks "on the fly"-anywhere, anytime, for virtually any application. The field is rapidly coming of age, reflecting powerful advances in protocols, systems, and real-world implementation experience. In Ad Hoc Mobile Wireless Networks, one of the field's leading researchers brings together these advances in a single consolidated and comprehensive archive. C.K. Toh covers all this, and more: Key challenges: device heterogeneity, diverse traffic profiles, mobility, and power conservation Routing protocols for ad hoc networks, including Associativity Based Routing (ABR) and other IETF MANET protocols Real-world implementation issues-including a complete prototype implementation Ad hoc wireless network performance: results obtained from the latest field trials Leading approaches to service discovery Addressing TCP over an ad hoc wireless network environment Support for multicast communications The role of Bluetooth and WAP Ad Hoc Mobile Wirelessapplication scenarios ranging from home and car to office and battlefield. C.K. Toh also introduces several of the field's leading projects, from Motorola's PIANO platform to UC Berkeley's "Smart Dust." Whether you're a researcher, scientist, implementer, consultant, technical manager, CTO, or student, you won't find a more authoritative and comprehensive guide to the new state of the art in ad hoc networking.
Cenciarelli P, Gorla D and Salvo I (2019). Depletable channels, Acta Informatica , 56 :5 , (405-431), Online publication date: 1-Jul-2019 .
Asakura K, Kato H and Watanabe T An Efficient Broadcast Method Based on Hexagonal Tessellation for Mobile Ad-hoc Networks Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, (1-5)
Sherif M, Azab M, Emad Y, Sameh S, Menisy F and Kandil B Eyes in the Sky Companion Proceedings of the10th International Conference on Utility and Cloud Computing, (131-137)
Fraser B, Hunjet R and Szabo C Simulating the effect of degraded wireless communications on emergent behavior Proceedings of the 2017 Winter Simulation Conference, (1-12)
Wang M and Yan Z (2017). A Survey on Security in D2D Communications, Mobile Networks and Applications , 22 :2 , (195-208), Online publication date: 1-Apr-2017 .
Gupta A, Bansal A, Naryani D and Sharma D CRPO Proceedings of the International Conference on High Performance Compilation, Computing and Communications, (121-125)
Zhang T, De Grande R and Boukerche A (2016). Design and analysis of stochastic traffic flow models for vehicular clouds, Ad Hoc Networks , 52 :C , (39-49), Online publication date: 1-Dec-2016 .
Leo Y, Busson A, Sarraute C and Fleury E (2016). Performance evaluation of DTN protocols to deliver sms in dense mobile network, Ad Hoc Networks , 52 :C , (173-182), Online publication date: 1-Dec-2016 .
Karam M, Safa H and Masud M (2016). WhatsUpNow, Multimedia Tools and Applications , 75 :21 , (13349-13374), Online publication date: 1-Nov-2016 .
Vijayalakshmi P, Francis S and Abraham Dinakaran J (2016). A robust energy efficient ant colony optimization routing algorithm for multi-hop ad hoc networks in MANETs, Wireless Networks , 22 :6 , (2081-2100), Online publication date: 1-Aug-2016 .
Leo Y, Sarraute C, Busson A and Fleury E Taking Benefit from the User Density in Large Cities for Delivering SMS Proceedings of the 12th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, (55-61)
Zhang T, De Grande R and Boukerche A Vehicular Cloud Proceedings of the 12th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, (9-16)
Alsaqour R, Abdelhaq M, Saeed R, Uddin M, Alsukour O, Al-Hubaishi M and Alahdal T (2015). Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic, Journal of Network and Computer Applications , 47 :C , (32-46), Online publication date: 1-Jan-2015 .
Zanjani M, Abhari S and Chefranov A Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network Proceedings of the 7th International Conference on Security of Information and Networks, (166-169)
Dhurandher S, Sharma D, Woungang I, Gupta R and Garg S (2014). GAER, The Journal of Supercomputing , 69 :3 , (1183-1214), Online publication date: 1-Sep-2014 .
Shobana M, Saranyadevi R and Karthik S Geographic routing used in MANET for black hole detection Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (201-204)
Mazhar N and Farooq M (2011). A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols, Applied Soft Computing , 11 :8 , (5695-5714), Online publication date: 1-Dec-2011 .
Frantti T and Koivula M (2011). Fuzzy packet size control for delay sensitive traffic in ad hoc networks, Expert Systems with Applications: An International Journal , 38 :8 , (10188-10198), Online publication date: 1-Aug-2011 .
Asakura K, Aoyama H and Watanabe T Movement algorithms for refugee agents for virtual disaster simulation systems Proceedings of the 5th KES international conference on Agent and multi-agent systems: technologies and applications, (583-591)
de Freitas E, Heimfarth T, Costa L, Ferreira A, Pereira C, Wagner F and Larsson T Analyzing different levels of geographic context awareness in agent ferrying over VANETs Proceedings of the 2011 ACM Symposium on Applied Computing, (413-418)
Nand P and Sharma S Performance analysis of FSR and ZRP routing protocols for MANET Proceedings of the International Conference & Workshop on Emerging Trends in Technology, (271-275)
Abdulai J, Ould-Khaoua M, Mackenzie L and Mohammed A (2010). A dynamic probabilistic route discovery for mobile ad hoc networks, International Journal of Communication Networks and Distributed Systems , 4 :1 , (108-130), Online publication date: 1-Dec-2010 .
Asakura K, Takikawa H, Oishi J and Watanabe T (2010). An ad-hoc unicursal protocol for stable and long-lived communication systems in disaster situations, International Journal of Knowledge and Web Intelligence , 1 :3/4 , (154-168), Online publication date: 1-Jul-2010 .
García-Nieto J and Alba E Automatic parameter tuning with metaheuristics of the AODV routing protocol for vehicular ad-hoc networks Proceedings of the 2010 international conference on Applications of Evolutionary Computation - Volume Part II, (21-30)
Ren Q (2010). Energy detection performance analysis for UWB radar sensor networks, EURASIP Journal on Wireless Communications and Networking , 2010 , (1-12), Online publication date: 1-Apr-2010 .
Imasaki Y, Zhang Y and Ji Y (2010). Secure and efficient data transmission in RFID sensor networks, International Journal of Security and Networks , 5 :2/3 , (119-127), Online publication date: 1-Mar-2010 .
Yang S, Cheng H and Wang F (2010). Genetic algorithms with immigrants and memory schemes for dynamic shortest path routing problems in mobile ad hoc networks, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews , 40 :1 , (52-63), Online publication date: 1-Jan-2010 .
Chaksaen S and Sathitwiriyawong C Buffer and loss monitoring for the control of multimedia data streaming rate on mobile ad hoc networks Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, (680-684)
Cenciarelli P, Gorla D and Salvo I Depletable channels Proceedings of the 17th international conference on Fundamentals of computation theory, (50-61)
Insung-Han and Hwangbin-Ryou Service discovery mechanism based on trustable DHT in MANET Proceedings of the 2009 International Conference on Hybrid Information Technology, (417-424)
Peper C and Schneider D On runtime service quality models in adaptive ad-hoc systems Proceedings of the 2009 ESEC/FSE workshop on Software integration and evolution @ runtime, (11-18)
Li L, Lee G, Kang L and Mei J Construct the Load-Balanced Topology in NEMO Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, (100-111)
Cheng H and Yang S Genetic algorithms with elitism-based immigrants for dynamic shortest path problem in mobile ad hoc networks Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (3135-3140)
Sankaranarayanan S Intelligent agent based information routing in wireless body sensor mesh networks Proceedings of the Sixth international conference on Wireless and Optical Communications Networks, (187-191)
Martinez F, Toh C, Cano J, Calafate C and Manzoni P Realistic radio propagation models (RPMs) for VANET simulations Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (1155-1160)
Sato N and Fujii T A MAC protocol for multi-packet ad-hoc wireless network utilizing multi-antenna Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, (509-513)
Badarneh O and Kadoch M (2009). Multicast routing protocols in mobile ad hoc networks, EURASIP Journal on Wireless Communications and Networking , 2009 , (1-42), Online publication date: 1-Jan-2009 .
Yow K and Aw G Efficient node reconfiguration in mobile ad hoc networks (MANETs) for wireless internet access point connection Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, (1-6)
Staab E, Fusenig V and Engel T Trust-Aided Acquisition Of Unverifiable Information Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence, (869-870)
Peper C and Schneider D Component engineering for adaptive ad-hoc systems Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems, (49-56)
Zhong S, Li L, Liu Y and Yang Y (2007). On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks, Wireless Networks , 13 :6 , (799-816), Online publication date: 1-Dec-2007 .
Kamidate S, Katoh T, Bista B and Takata T Fault-tolerant ZHLS routing protocol for wireless mobile ad hoc network Proceedings of the 7th Conference on 7th WSEAS International Conference on Multimedia, Internet & Video Technologies - Volume 7, (247-252)
Ngoc T and Travers N Tree graph views for a distributed pervasive environment Proceedings of the 1st international conference on Network-based information systems, (406-415)
Merwe J, Dawoud D and McDonald S (2007). A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys , 39 :1 , (1-es), Online publication date: 12-Apr-2007 .
Ho C and Ewe H Ant Colony Optimization Approaches for the Dynamic Load-Balanced Clustering Problem in Ad Hoc Networks Proceedings of the 2007 IEEE Swarm Intelligence Symposium, (76-83)
Jingyao Zhang , Kai Cai , Letaief K and Pingyi Fan A Network Coding Unicast Strategy for Wireless Multi-Hop Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (4221-4226)
Lin Du , Dan Shang and Yan Zhang Chip-level Synchronization for Ad Hoc Enabled UTRA-TDD Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1172-1176)
Bordim J, Ito Y and Nakano K Randomized leader election protocols in noisy radio networks with a single transceiver Proceedings of the 4th international conference on Parallel and Distributed Processing and Applications, (246-256)
Almomani I, Al-Akaidi M, Reynolds P and Ivins J (2006). Architectural framework for wireless mobile ad hoc networks (AF WMANETs), Computer Communications , 30 :1 , (178-191), Online publication date: 1-Dec-2006 .
Balakrishnan M and Johnson E Fuzzy diffusion analysis Proceedings of the 2006 IEEE conference on Military communications, (132-138)
Cherkaoui S and Lahlou O MSBR Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks, (129-136)
Yassein M, Khaoua M, Mackenzie L, Papanastasiou S and Jamal A Improving route discovery in on-demand routing protocols using local topology information in MANETs Proceedings of the ACM international workshop on Performance monitoring, measurement, and evaluation of heterogeneous wireless and wired networks, (95-99)
Karayiannis N and Nagabhushan Kaliyur S (2006). An entropy-constrained algorithm for routing of communication networks, Computer Communications , 29 :16 , (3182-3196), Online publication date: 1-Oct-2006 .
Kim I, Kim Y and Kim K Zone-Based clustering for intrusion detection architecture in ad-hoc networks Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services, (253-262)
Han Y, La R, Makowski A and Lee S (2006). Distribution of path durations in mobile ad-hoc networks, Computer Networks: The International Journal of Computer and Telecommunications Networking , 50 :12 , (1887-1900), Online publication date: 24-Aug-2006 .
Hoebeke J, Moerman I, Dhoedt B and Demeester P (2006). Analysis of decentralized resource and service discovery mechanisms in wireless multi-hop networks, Computer Communications , 29 :13-14 , (2710-2720), Online publication date: 1-Aug-2006 .
Sheu T and Lu Y Power minimization with end-to-end frame error constraints in wireless multi-hop sensor networks Proceedings of the 2006 international conference on Wireless communications and mobile computing, (1045-1050)
Tam Y, Hassanein H and Akl S Effective channel assignment in multi-hop W-CDMA cellular networks Proceedings of the 2006 international conference on Wireless communications and mobile computing, (569-574)
Nie J, Wen J, Luo J, He X and Zhou Z (2006). An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks, Fuzzy Sets and Systems , 157 :12 , (1704-1712), Online publication date: 1-Jun-2006 .
Shim Y A secure multicast routing protocol for ad hoc networks with misbehaving nodes Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II, (591-600)
Kumar S, Raghavan V and Deng J (2006). Medium Access Control protocols for ad hoc wireless networks, Ad Hoc Networks , 4 :3 , (326-358), Online publication date: 1-May-2006 .
El-Afandi H, Hosseini H and Vairavan K (2006). A wireless ad hoc protocols comparison study: DSR, AODV and IWAR, Journal of Computational Methods in Sciences and Engineering , 6 :5,6 Supplement 1 , (181-190), Online publication date: 1-Apr-2006 .
Karayiannis N and Nadella S (2006). Power-conserving routing of ad hoc mobile wireless networks based on entropy-constrained algorithms, Ad Hoc Networks , 4 :1 , (24-35), Online publication date: 1-Jan-2006 .
Krishnan R and Starobinski D (2006). Efficient clustering algorithms for self-organizing wireless sensor networks, Ad Hoc Networks , 4 :1 , (36-59), Online publication date: 1-Jan-2006 .
Zhe L, Jun L, Dan L and Ye L A security enhanced AODV routing protocol Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (298-307)
Bür K and Ersoy C (2005). Ad hoc quality of service multicast routing, Computer Communications , 29 :1 , (136-148), Online publication date: 1-Dec-2005 .
Hassanein H, You T and Mouftah H (2005). Infrastructure-based MAC in wireless mobile ad-hoc networks, Ad Hoc Networks , 3 :6 , (717-743), Online publication date: 1-Nov-2005 .
El-Afandi H, Hosseini H and Vairavan K A simulation study of the intelligent wireless ad hoc routing (IWAR) protocol Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, (264-266)
Lee S, Youn J, Jung S, Lee J and Kang C Selective route-request scheme for on-demand routing protocols in ad hoc networks Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks, (153-163)
Zimmermann K, Felis S, Schmid S, Eggert L and Brunner M Autonomic wireless network management Proceedings of the Second international IFIP conference on Autonomic Communication, (57-70)
Zhong S, Li L, Liu Y and Yang Y On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks Proceedings of the 11th annual international conference on Mobile computing and networking, (117-131)
Dai Q and Wu J (2005). Computation of Minimal Uniform Transmission Range in Ad Hoc Wireless Networks, Cluster Computing , 8 :2-3 , (127-133), Online publication date: 1-Jul-2005 .
Hoebeke J, Moerman I, Dhoedt B and Demeester P Analysis of decentralized resource and service discovery mechanisms in wireless multi-hop networks Proceedings of the Third international conference on Wired/Wireless Internet Communications, (181-191)
de Siqueira M, Figueiredo F, Rocha F, Martins J and de Castro M Policy-based dynamic reconfiguration of mobile ad hoc networks Proceedings of the 4th international conference on Networking - Volume Part II, (116-124)
Alsalih W, Akl S and Hassanein H Energy-Aware Task Scheduling Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Lin X, Kwok Y and Lau V (2005). A Quantitative Comparison of Ad Hoc Routing Protocols with and without Channel Adaptation, IEEE Transactions on Mobile Computing , 4 :2 , (111-128), Online publication date: 1-Mar-2005 .
Garg V and Ghosh R Effect of data encryption on wireless ad hoc network performance Proceedings of the 6th international conference on Distributed Computing, (258-263)
Haenggi M Routing in Ad Hoc Networks-A Wireless Perspective Proceedings of the First International Conference on Broadband Networks, (652-660)
Mohan M and Joiner L Solving billing issues in ad hoc networks Proceedings of the 42nd annual ACM Southeast Conference, (31-36)
Al-Shurman M, Yoo S and Park S A performance simulation for route maintenance in wireless ad hoc networks Proceedings of the 42nd annual ACM Southeast Conference, (25-30)
Santos R, Edwards R and Seed N Supporting inter-vehicular and vehicle-roadside communications over a cluster-based wireless ad-hoc routing algorithm Proceedings of the winter international synposium on Information and communication technologies, (1-6)
Hossain E, Palit R and Thulasiraman P Clustering in mobile wireless ad hoc networks Wireless communications systems and networks, (383-424)
Wei L Connectivity reliability of large scale random ad hoc networks Proceedings of the 2003 IEEE conference on Military communications - Volume I, (411-415)
O'Grady J, Rea S, Cummins S, Pesch D and Mathur R Dynamic configuration management for MANETs Proceedings of the 1st international symposium on Information and communication technologies, (187-192)
Cetintemel U, Flinders A and Sun Y Power-efficient data dissemination in wireless sensor networks Proceedings of the 3rd ACM international workshop on Data engineering for wireless and mobile access, (1-8)
Günes M and Spaniol O Ant-routing-algorithm for mobile multi-hop ad-hoc networks Network control and engineering for Qos, security and mobility II, (120-138)