Sciweavers

133 search results - page 4 / 27
» Neutralization of Errors and Attacks in Wireless Ad Hoc Netw...
Sort
View
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
13 years 11 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
ICNP
2002
IEEE
13 years 9 months ago
Design and Implementation of a TCP-Friendly Transport Protocol for Ad Hoc Wireless Networks
Transport protocol design for mobile ad hoc networks is challenging because of unique issues, including mobilityinduced disconnection, reconnection, and high out-of-order delivery...
Zhenghua Fu, Benjamin Greenstein, Xiaoqiao Meng, S...
ICARIS
2009
Springer
13 years 11 months ago
An Error Propagation Algorithm for Ad Hoc Wireless Networks
Abstract. We were inspired by the role of co-stimulation in the Biological immune system (BIS). We propose and evaluate an algorithm for energy efficient misbehavior detection in a...
Martin Drozda, Sven Schaust, Sebastian Schildt, He...
CORR
2011
Springer
536views Education» more  CORR 2011»
12 years 12 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
TELSYS
2010
86views more  TELSYS 2010»
12 years 11 months ago
Cross-layer TCP with bitmap error recovery scheme in wireless ad hoc networks
Rung-Shiang Cheng, Der-Jiunn Deng, Yueh-Min Huang,...