Sciweavers

1197 search results - page 68 / 240
» Information-directed routing in ad hoc sensor networks
Sort
View
GLOBECOM
2006
IEEE
15 years 3 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 3 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
INFOCOM
2003
IEEE
15 years 3 months ago
Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks
Abstract— Traditionally, reliable multicast protocols are deterministic in nature. It is precisely this determinism that tends to become their limiting factor when aiming at reli...
Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux
VTC
2008
IEEE
165views Communications» more  VTC 2008»
15 years 4 months ago
Operation and Performance of Vehicular Ad-Hoc Routing Protocols in Realistic Environments
—Vehicle-to-vehicle and vehicle-to-infrastructure wireless communications are currently under development to improve traffic efficiency and safety. Routing protocols enabling mul...
Ramon Bauza, Javier Gozálvez, Miguel Sepulc...
BROADNETS
2006
IEEE
14 years 11 months ago
On the Broadcast Storm Problem in Ad hoc Wireless Networks
Routing protocols developed for ad hoc wireless networks use broadcast transmission to either discover a route or disseminate information. More specifically, reactive routing proto...
Ozan K. Tonguz, Nawaporn Wisitpongphan, Jayendra S...