Sciweavers

34 search results - page 4 / 7
» Performance Analysis of Beamforming in Two Hop Amplify and F...
Sort
View
IMC
2005
ACM
13 years 10 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
Jianhong Xia, Lixin Gao, Teng Fei
GLOBECOM
2007
IEEE
13 years 11 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
ICDCSW
2003
IEEE
13 years 10 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
JSAC
2008
136views more  JSAC 2008»
13 years 5 months ago
Fixed point opportunistic routing in delay tolerant networks
We propose in this work a single copy and multi-hop opportunistic routing scheme for sparse delay tolerant networks (DTNs). The scheme uses as only input the estimates of the avera...
Vania Conan, Jeremie Leguay, Timur Friedman
CISS
2007
IEEE
13 years 11 months ago
Routing Strategies in Broadband Multihop Cooperative Networks
— Two fundamental properties of wireless networks, the variable link quality and the broadcast nature of the transmission, have often been ignored in the design of routing protoc...
Bo Gui, Lin Dai, Leonard J. Cimini Jr.