Sciweavers

364 search results - page 27 / 73
» On the Interaction Between IEEE 802.11e and Routing Protocol...
Sort
View
GLOBECOM
2006
IEEE
14 years 2 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
AINA
2007
IEEE
14 years 2 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
VTC
2007
IEEE
115views Communications» more  VTC 2007»
14 years 2 months ago
The DYMO Routing Protocol in VANET Scenarios
—Coupling Vehicular Ad Hoc Networks (VANETs) with wired networks such as the Internet via access points creates a difficult mix of highly mobile nodes and a static infrastructur...
Christoph Sommer, Falko Dressler
IPCCC
2007
IEEE
14 years 2 months ago
Rerouting Time and Queueing in Proactive Ad Hoc Networks
In a MANET network where nodes move frequently, the probability of connectivity loss between nodes might be high, and communication sessions may easily loose connectivity during t...
Vinh Pham, Erlend Larsen, Knut Øvsthus, Paa...
INFOCOM
2007
IEEE
14 years 2 months ago
Connectivity-Aware Routing (CAR) in Vehicular Ad-hoc Networks
— Vehicular ad hoc networks using WLAN technology have recently received considerable attention. We present a position-based routing scheme called Connectivity-Aware Routing (CAR...
Valery Naumov, Thomas R. Gross