Sciweavers

804 search results - page 122 / 161
» Limited flooding protocol for mobile ad hoc networks
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
MOBICOM
2006
ACM
14 years 2 months ago
SKVR: scalable knowledge-based routing architecture for public transport networks
Vehicular AdHoc Networks (VANET) can be treated as special kinds of Delay-tolerant Networks (DTN) where end-toend path might never be possible. As a result, mobile adhoc (MANET) r...
Shabbir Ahmed, Salil S. Kanhere
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 3 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
ICCCN
2008
IEEE
14 years 3 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
INFOCOM
2003
IEEE
14 years 2 months ago
Energy Efficient Routing in Ad Hoc Disaster Recovery Networks
—The terrorist attacks on September 11, 2001 have drawn attention to the use of wireless technology in order to locate survivors of structural collapse. We propose to construct a...
Gil Zussman, Adrian Segall