Sciweavers

227 search results - page 31 / 46
» Attack Analysis and Detection for Ad Hoc Routing Protocols
Sort
View
MOBIHOC
2002
ACM
15 years 11 months ago
Weak duplicate address detection in mobile ad hoc networks
Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirabl...
Nitin H. Vaidya
ICC
2000
IEEE
376views Communications» more  ICC 2000»
15 years 4 months ago
TCP-Bus: Improving TCP Performance in Wireless Ad-Hoc Networks
Abstract: Reliable data transmission over wireless multi-hop networks, called ad hoc networks, has proven to be non-trivial. TCP (Transmission Control Protocol), a widely used end-...
Dongkyun Kim, Chai-Keong Toh, Yanghee Choi
WS
2005
ACM
15 years 5 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
JSAC
2006
136views more  JSAC 2006»
14 years 11 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
CEE
2010
86views more  CEE 2010»
14 years 12 months ago
Scalability of MANET routing protocols for heterogeneous and homogenous networks
In Mobile Ad hoc Network (MANET), mobility, traffic and node density are main network conditions that significantly affect the performance of routing protocols. Much of the previou...
Huda AlAmri, Mehran Abolhasan, Tadeusz A. Wysocki