Sciweavers

133 search results - page 19 / 27
» Neutralization of Errors and Attacks in Wireless Ad Hoc Netw...
Sort
View
INFOCOM
2006
IEEE
14 years 22 days ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
PIMRC
2008
IEEE
14 years 1 months ago
Distributed scheduling with end-to-end compensation in multihop ad hoc networks
Abstract-In this paper, we investigate the problem of providing QoS to end-to-end flows in multihop ad hoc networks with channel errors through packet scheduling. Each flow is asso...
Yijiang Sun, Victor O. K. Li, Ka-Cheong Leung
ESAS
2006
Springer
13 years 10 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
NETWORKING
2004
13 years 8 months ago
Combining Source- and Localized Recovery to Achieve Reliable Multicast in Multi-hop Ad Hoc Networks
This paper proposes a novel reliable multicast transport protocol for multi-hop, wireless ad hoc networks (or MANETs). To recover from the different types of losses that may occur ...
Venkatesh Rajendran, Katia Obraczka, Yunjung Yi, S...
PE
2006
Springer
158views Optimization» more  PE 2006»
13 years 6 months ago
Performance evaluation of multiple-rate mobile ad hoc networks
Existing wireless networks usually provide multiple data transmission rates. This paper presents a simulation study on the performance of multiple-rate mobile ad hoc networks (MAN...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava