Sciweavers

258 search results - page 22 / 52
» Real-Time Intrusion Detection for Ad Hoc Networks
Sort
View
JNSM
2002
218views more  JNSM 2002»
13 years 7 months ago
An Agent-based Connection Management Protocol for Ad Hoc Wireless Networks
Realizing high volume of data transmission in real time communication in a highly dynamic architecture like Mobile Ad hoc Networks (MANET) still remains a major point of research....
Romit Roy Choudhury, Krishna Paul, Somprakash Band...
INFOCOM
2003
IEEE
14 years 26 days ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
MONET
2002
128views more  MONET 2002»
13 years 7 months ago
MARE: Resource Discovery and Configuration in Ad Hoc Networks
The emergence of personal portable devices, such as PDA's and Mobile phones, with considerable processing and communication capabilities, has led to a desire to use various co...
Matt Storey, Gordon S. Blair, Adrian Friday
ADHOCNOW
2003
Springer
14 years 25 days ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
ADAEUROPE
2003
Springer
14 years 25 days ago
A Round Robin Scheduling Policy for Ada
Abstract. Although Ada defines a number of mechanisms for specifying scheduling policies, only one, Fifo Within Priorities is guaranteed to be supported by all implementations of ...
Alan Burns, Michael González Harbour, Andy ...