Sciweavers

215 search results - page 4 / 43
» A Mobile Ambients-Based Approach for Network Attack Modellin...
Sort
View
110
Voted
SERSCISA
2009
Springer
15 years 10 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
134
Voted
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 3 months ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...
149
Voted
PADS
2004
ACM
15 years 9 months ago
Detailed OFDM Modeling in Network Simulation of Mobile Ad Hoc Networks
In mobile ad hoc network (MANET) studies, it is imperative to use highly detailed device models as they provide high layer protocols with good prediction of underlying wireless co...
Gavin Yeung, Mineo Takai, Rajive Bagrodia, Alireza...
165
Voted
MONET
2006
173views more  MONET 2006»
15 years 3 months ago
Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks
We analyze an architecture based on mobility to address the problem of energy efficient data collection in a sensor network. Our approach exploits mobile nodes present in the senso...
Sushant Jain, Rahul Shah, Waylon Brunette, Gaetano...
153
Voted
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 8 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...