Sciweavers

1970 search results - page 234 / 394
» Node Localisation in Wireless Ad Hoc Networks
Sort
View
IJNM
2008
112views more  IJNM 2008»
15 years 4 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
JSAC
2006
156views more  JSAC 2006»
15 years 4 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
INFOCOM
2006
IEEE
15 years 10 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
WOWMOM
2006
ACM
84views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Measurements from an 802.11b Mobile Ad Hoc Network
This paper analyzes the characteristics of a multi-hop 802.11b mobile ad hoc network. We present data gathered from a mobile network of 20 devices carried by test users over 5 day...
Vincent Lenders, Jorg Wagner, Martin May
ICIP
2005
IEEE
16 years 6 months ago
Distributed rate allocation for multi-stream video transmission over ad hoc networks
When multiple video streams are present in an ad hoc network, they share and compete for the common network resources. A rate allocation algorithm must balance the available resou...
Xiaoqing Zhu, Bernd Girod