Sciweavers

123 search results - page 16 / 25
» Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Sort
View
PAKDD
2007
ACM
238views Data Mining» more  PAKDD 2007»
15 years 3 months ago
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks
A mobile node in ad hoc networks may move arbitrarily and acts as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. Th...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Shun C...
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 4 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
CORR
2006
Springer
206views Education» more  CORR 2006»
14 years 9 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
MMNS
2003
130views Multimedia» more  MMNS 2003»
14 years 11 months ago
TCP Friendly Rate Adaptation for Multimedia Streaming in Mobile ad hoc Networks
Transport protocol for supporting multimedia streaming in mobile ad hoc networks has to cope with the rich dynamics, including mobility-induced disconnection, reconnection, and hig...
Zhenghua Fu, Xiaoqiao Meng, Songwu Lu
JSAC
2006
114views more  JSAC 2006»
14 years 9 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu