Sciweavers

1440 search results - page 176 / 288
» A protocol for packet network intercommunication
Sort
View
146
Voted
MOBIHOC
2005
ACM
16 years 4 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
139
Voted
TPDS
2002
173views more  TPDS 2002»
15 years 4 months ago
Data Gathering Algorithms in Sensor Networks Using Energy Metrics
Sensor webs consisting of nodes with limited battery power and wireless communications are deployed to collect useful information from the field. Gathering sensed information in an...
Stephanie Lindsey, Cauligi S. Raghavendra, Krishna...
196
Voted
SECPERU
2006
IEEE
15 years 10 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
JCM
2006
101views more  JCM 2006»
15 years 4 months ago
On the Analysis of Mobility Mechanisms in Micro Mobile MPLS Access Networks
Abstract--One of the major challenges for the nextgeneration mobile systems is related to efficient mobility management issue. In this paper, we propose a new micromobility managem...
Rami Langar, Nizar Bouabdallah, Samir Tohmé
203
Voted
ACSC
2004
IEEE
15 years 8 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald