Sciweavers

183 search results - page 10 / 37
» Intrusion detection in wireless ad-hoc networks
Sort
View
ICC
2009
IEEE
153views Communications» more  ICC 2009»
14 years 2 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
ADHOCNOW
2003
Springer
14 years 18 days ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
ICC
2009
IEEE
157views Communications» more  ICC 2009»
14 years 2 months ago
Transmission Capacity of Wireless Ad Hoc Networks: Successive Interference Cancellation vs. Joint Detection
Abstract—The performance benefits of two interference cancellation methods, successive interference cancellation (SIC) and joint detection (JD), in wireless ad hoc networks are ...
Joseph Blomer, Nihar Jindal
PIMRC
2010
IEEE
13 years 5 months ago
Power control versus multiuser detection based cross-layer design in wireless ad hoc networks
Abstract--In wireless ad hoc networks, multiple access interference is the limiting factor for the overall system performance. The lack of any central control unit necessitates a c...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
ASE
2005
96views more  ASE 2005»
13 years 7 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton