— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
—Vehicle-to-vehicle and vehicle-to-infrastructure wireless communications are currently under development to improve traffic efficiency and safety. Routing protocols enabling mul...
In this paper, we designed and implemented an integrated wireless system, namely a SIP-based MIP6-MANET system. This SIP-based MIP6MANET system is an integration and implementatio...
In most studies on mobile ad hoc networks (MANET), simulation models are used for the evaluation of devices and protocols. Typically, such simulations focus on the specific higher...