Sciweavers

88 search results - page 5 / 18
» Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Netw...
Sort
View
BROADNETS
2007
IEEE
14 years 1 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
PAKDD
2007
ACM
238views Data Mining» more  PAKDD 2007»
14 years 1 months ago
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks
A mobile node in ad hoc networks may move arbitrarily and acts as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. Th...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Shun C...
WONS
2005
IEEE
14 years 1 months ago
The Pulse Protocol: Mobile Ad hoc Network Performance Evaluation
— We present a performance evaluation of the Pulse protocol operating in a peer-to-peer mobile ad hoc network environment. The Pulse protocol utilizes a periodic flood (the puls...
Baruch Awerbuch, David Holmer, Herbert Rubens
IAJIT
2007
150views more  IAJIT 2007»
13 years 7 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
PERCOM
2003
ACM
14 years 23 days ago
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks
We investigate the performance issues of destinationsequenced distance vector (DSDV) and ad-hoc on-demand distance vector (AODV) routing protocols for mobile ad hoc networks. Four...
Yi Lu, Weichao Wang, Yuhui Zhong, Bharat K. Bharga...