Sciweavers

1862 search results - page 20 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 5 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
ISCC
2003
IEEE
122views Communications» more  ISCC 2003»
15 years 4 months ago
TCP-aware Source Routing in Mobile Ad Hoc Networks
— Temporary link failures and route changes occur frequently in mobile ad hoc networks. Since TCP assumes that all packet losses are due to network congestion, TCP does not show ...
Jin-Hee Choi, Chuck Yoo
MOBICOM
1999
ACM
15 years 3 months ago
Query Localization Techniques for On-Demand Routing Protocols in ad hoc Networks
Mobile ad hoc networks are characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Design of efficient routing protocols in ...
Robert Castañeda, Samir Ranjan Das
ICDCS
2003
IEEE
15 years 4 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
ICWN
2003
15 years 20 days ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...