Sciweavers

258 search results - page 27 / 52
» Real-Time Intrusion Detection for Ad Hoc Networks
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
13 years 9 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
CSREASAM
2006
13 years 9 months ago
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing
A mobile ad hoc network is a self-organizing network that relies on the cooperation of participating nodes in order to function properly. In this network, mobile users arrive withi...
Ebrahim Khosravi, Brandy Tyson
GLOBECOM
2007
IEEE
13 years 11 months ago
Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking
Zero Configuration Networking (Zeroconf) assigns IP addresses and host names, and discovers service without a central server. Zeroconf can be used in wireless mobile ad-hoc network...
Se Gi Hong, Suman Srinivasan, Henning Schulzrinne
IPPS
2006
IEEE
14 years 1 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
AINTEC
2006
Springer
13 years 11 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha