scispace - formally typeset
E

Elizabeth M. Belding-Royer

Researcher at University of California, Santa Barbara

Publications -  61
Citations -  17964

Elizabeth M. Belding-Royer is an academic researcher from University of California, Santa Barbara. The author has contributed to research in topics: Wireless ad hoc network & Ad hoc wireless distribution service. The author has an hindex of 30, co-authored 56 publications receiving 17657 citations. Previous affiliations of Elizabeth M. Belding-Royer include University of California.

Papers
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

A secure routing protocol for ad hoc networks

TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Proceedings ArticleDOI

Towards realistic mobility models for mobile ad hoc networks

TL;DR: Simulation results show that the use of obstacles and pathways has a significant impact on the performance of ad hoc network protocols.
Proceedings ArticleDOI

AODV routing protocol implementation design

TL;DR: The event triggers required for AODV operation, the design possibilities and the decisions for the ad hoc on-demand distance vector routing protocol implementation, A ODV-UCSB are described.
Journal ArticleDOI

Authenticated routing for ad hoc networks

TL;DR: This paper describes and evaluates ARAN and shows that it is able to effectively and efficiently discover secure routes within an ad hoc network, and details how ARAN can secure routing in environments where nodes are authorized to participate but untrusted to cooperate, as well as environments where participants do not need to be authorization to participate.