Sciweavers

123 search results - page 19 / 25
» Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Sort
View
SASN
2006
ACM
15 years 3 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
GLOBECOM
2010
IEEE
14 years 7 months ago
Risk-Aware Response for Mitigating MANET Routing Attacks
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received co...
Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu
RAID
2004
Springer
15 years 3 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
ICC
2000
IEEE
376views Communications» more  ICC 2000»
15 years 2 months ago
TCP-Bus: Improving TCP Performance in Wireless Ad-Hoc Networks
Abstract: Reliable data transmission over wireless multi-hop networks, called ad hoc networks, has proven to be non-trivial. TCP (Transmission Control Protocol), a widely used end-...
Dongkyun Kim, Chai-Keong Toh, Yanghee Choi
80
Voted
ADHOCNOW
2005
Springer
15 years 3 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves