Sciweavers

571 search results - page 69 / 115
» Simulating Realistic Packet Routing without Routing Protocol...
Sort
View
109
Voted
ALGOSENSORS
2007
Springer
15 years 2 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
115
Voted
ICDCSW
2009
IEEE
15 years 7 months ago
Dynamic TCP Proxies: Coping with Disadvantaged Hosts in MANETs
Applications in mobile ad-hoc networks can suffer from poor link quality and degraded network services. In particular, standard TCP over low-quality, long routing paths, can have ...
Tu Ouyang, Shudong Jin, Michael Rabinovich
150
Voted
CORR
2010
Springer
432views Education» more  CORR 2010»
15 years 18 days ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
82
Voted
ICCS
2007
Springer
15 years 6 months ago
Local Link Protection Scheme in IP Networks
In this paper, we proposed an IP Local Link-Protection (IPLLP) scheme based on the characteristic of shortest-path routing in IP networks. Our scheme working in an intra-area routi...
Hui-Kai Su, Cheng-Shong Wu
107
Voted
PEWASUN
2004
ACM
15 years 6 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...