Recent work in mobile ad hoc networks, simply MANETs, has drawn attention to the mobility capability of each node. In [5], it is proved that the optimal positions of the relay nod...
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
We present the design and evaluation of two forms of power management schemes that reduce the energy consumption of networks. The first is based on putting network components to s...
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive – but potentially crude – method of processing t...