Sciweavers

1390 search results - page 10 / 278
» Virtual Mobile Nodes for Mobile Ad Hoc Networks
Sort
View
CIIT
2007
195views Communications» more  CIIT 2007»
15 years 2 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
ICON
2007
IEEE
15 years 7 months ago
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks
-- This paper presents a hardware based cache scheme to detect misbehaving nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upper-layer s...
Hongxun Liu, José G. Delgado-Frias, Sirisha...
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
15 years 7 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
EWSN
2004
Springer
16 years 1 months ago
A Novel Mechanism for Routing in Highly Mobile ad hoc Sensor Networks
This paper describes a novel routing mechanism for a network of highly mobile sensor nodes that routes data over dynamically changing topologies, using only information from neares...
Jane Tateson, Ian W. Marshall
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 7 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen