Sciweavers

121 search results - page 5 / 25
» Active route-maintenance protocol for signal-based communica...
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
IJSNET
2007
91views more  IJSNET 2007»
13 years 7 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
ICC
2000
IEEE
188views Communications» more  ICC 2000»
14 years 2 hour ago
Route-Lifetime Assessment Based Routing (RABR) Protocol for Mobile Ad-Hoc Networks
—Owing to the absence of any static support structure, Ad-hoc networks are prone to link failures. The ‘shortest path seeking’ routing protocols may not lead to stable routes...
Sulabh Agarwal, Ashish Ahuja, Jatinder Pal Singh, ...
ICC
2007
IEEE
155views Communications» more  ICC 2007»
14 years 1 months ago
On Supporting Robust Voice Multicasting Over Ad Hoc Wireless Networks
Abstract— In this paper, we address the problem of voice multicasting in ad hoc wireless networks. The unique characteristics of voice traffic (viz. small packet size, high pack...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...
IFIP
2004
Springer
14 years 29 days ago
Activity-Based User Modeling in Service-Oriented Ad-Hoc-Networks
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly a...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...