The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While the problem of greedy behavior at the MAC layer has been widely explored in the context of wireless local area networks, its study for multi-hop wireless networks still almost an unexplored and unexplained problem. Indeed, in a wireless local area network, an access point mostly forwards packets sent by wireless nodes over the wired link. In this case, a greedy node can easily get more bandwidth...
It is well known that security threats, in wireless ad hoc networks, are becoming a serious problem which may lead to harmful consequences on network performance. Despite that, many routing protocols still not resilient to such threats or their countermeasures are not efficient. Moreover, the vulnerability of MAC layer protocols to some attacks exacerbates the damage caused by the threats at higher...
As compared to its wired counterpart, wireless network is relatively new and is exposed to some additional threats specific to the underlying medium. Among these threats the jamming attack which can take place easily due to the open nature of wireless medium. A device or person can continuously emit radio signals to disturb a valid conversation. If it lasts for sometime continuously, it can result...
The most commonly used medium access mechanism in WLAN is based on the CSMA/CA protocol. This protocol schedules properly the access to the medium among all competing nodes. However, in a hostile environment, such as wireless local area networks (WLANs), selfish or greedy behaving nodes may prefer to decline the proper use of the protocol's rules in order to increase their bandwidth shares at the...
In wireless ad hoc networks, employing the IEEE 802.11 technology, access to the wireless medium is scheduled according to the CSMA/CA protocol. This protocol was designed with the assumption that nodes would follow properly its operation and never deviate from it. However, it is common to have selfish nodes that may choose to disobey this protocol in order to either gain more bandwidth or degrade...
While a variety of AIDS (anomaly-based intrusion detection system) are claimed to be fully distributed, lightweight, and ready for application, their detection cost are not always neglectable, especially when considering the fact that MANET nodes have scarce resources which usually impels them to avoid any unnecessary action. It is therefore a significant issue to optimally deploy AIDS sensors to...
In this paper, we address the problem of cooperative black hole attack, one of the major security issues in mobile ad hoc networks. The aim of this attack is to force nodes in the network to choose hostile nodes as relays to disseminate the partial topological information, thereby exploiting the functionality of the routing protocol to retain control packets. In optimized link state routing (OLSR)...
A mobile ad hoc network is made of a collection of nodes connected through a wireless medium and form a wireless multihop network with possible changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats or attacks aiming at the disruption of the protocol itself. The widely assumed trusted environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.