Sciweavers

90 search results - page 7 / 18
» Flooding strategy for target discovery in wireless networks
Sort
View
MOBICOM
2000
ACM
13 years 11 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 6 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin
BROADNETS
2006
IEEE
13 years 8 months ago
On the Broadcast Storm Problem in Ad hoc Wireless Networks
Routing protocols developed for ad hoc wireless networks use broadcast transmission to either discover a route or disseminate information. More specifically, reactive routing proto...
Ozan K. Tonguz, Nawaporn Wisitpongphan, Jayendra S...
GLOBECOM
2007
IEEE
14 years 1 months ago
Mobility-Aided Routing in Multi-Hop Heterogeneous Networks with Group Mobility
— This paper investigates routing strategies for mobile and heterogeneous multi-hop wireless networks. We leverage the knowledge about users mobility to improve the efficiency o...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
NETWORK
2006
177views more  NETWORK 2006»
13 years 6 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang