Sciweavers

170 search results - page 3 / 34
» Prohibitive-link Detection and Routing Protocol
Sort
View
CCECE
2009
IEEE
15 years 3 months ago
Prohibitive-link Detection and Routing Protocol
In this paper we investigate the limits of routing according to left- or righthand rule (LHR). Using LHR, a node upon receipt of a message will forward to the neighbour that sits ...
Marwan Fayed, Hussein T. Mouftah
ICNP
1998
IEEE
15 years 3 months ago
Statistical Anomaly Detection for Link-State Routing Protocols
The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against OSPF (Open Shortest Path First) routing protocol. This paper presents the imple...
D. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyht...
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 5 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
RAID
2004
Springer
15 years 5 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
INFOCOM
2000
IEEE
15 years 4 months ago
A QoS-Aware Multicast Routing Protocol
—The future Internet is expected to support multicast applications with quality of service (QoS) requirements. To facilitate this, QoS multicast routing protocols are pivotal in ...
Shigang Chen, Klara Nahrstedt, Yuval Shavitt