Sciweavers

420 search results - page 62 / 84
» Rushing attacks and defense in wireless ad hoc network routi...
Sort
View
ADHOCNOW
2008
Springer
14 years 2 months ago
Adapting BitTorrent to Wireless Ad Hoc Networks
Abstract. BitTorrent is one of the Internet’s most efficient content distribution protocols. It is known to perform very well over the wired Internet where end-to-end performance...
Mohamed Karim Sbai, Chadi Barakat, Jaeyoung Choi, ...
MOBICOM
2005
ACM
14 years 1 months ago
Experimental characterization of multi-hop communications in vehicular ad hoc network
This paper presents the performance measurement of TCP and UDP communication of a multi-hop Vehicular Ad Hoc Network (VANET) in highway and suburban areas. We use existing out-ofb...
Fay Hui, Prasant Mohapatra
SECON
2008
IEEE
14 years 2 months ago
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks
—Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 1 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
ADHOC
2007
115views more  ADHOC 2007»
13 years 7 months ago
Modeling adaptive node capture attacks in multi-hop wireless networks
We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev–Yao model are know...
Patrick Tague, Radha Poovendran