Sciweavers

465 search results - page 7 / 93
» Resilience to Dropping Nodes in Mobile Ad Hoc Networks with ...
Sort
View
ICON
2007
IEEE
14 years 1 months ago
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks
-- This paper presents a hardware based cache scheme to detect misbehaving nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upper-layer s...
Hongxun Liu, José G. Delgado-Frias, Sirisha...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 2 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
IJNM
2008
112views more  IJNM 2008»
13 years 7 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
JDCTA
2010
179views more  JDCTA 2010»
13 years 2 months ago
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Routing protocol is a pivotal issue in Mobile Ad Hoc Networks (MANETs). Several routing protocols have been proposed to deal with the routing issue in MANETs. However, routing tur...
Taifei Zhao, Xizheng Ke, Peilin Yang
INFOCOM
2010
IEEE
13 years 6 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...