The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Link state routing mechanisms have shown good convergence behaviour in networks with mobile hosts. Compared to traditional link state mechanisms, which suffer from broadcast storm problems in mobile ad hoc networks (MANETs), pruned link state approaches such as those used in optimized link state routing (OLSR) have shown significant reduction in the control overhead. In this paper, we show that the...
We present a complete scenario driven component based analytic model of 802.11 MAC and OLSR routing protocols in MANETs. We use this model to provide a systematic approach to study the network performance and cross-layer analysis and design of routing, scheduling, MAC and PHY layer protocols. The routing protocol is divided into multiple components. Componentization is a standard methodology for analysis...
We propose a component based methodology for modelling and design of wireless routing protocols. Componentization is a standard methodology for analysis and synthesis of complex systems, or software. The feasibility of the component based design relies heavily on the compositionality property (i.e. system-level properties can be computed from properties of components). To provide a component based...
Securing group communications in resource constrained, infrastructure-less environments such as mobile ad hoc networks (MANETs) has become one of the most challenging research directions in the areas of wireless network security. MANETs are emerging as the desired environment for an increasing number of commercial and military applications, addressing also an increasing number of users. Security on...
We develop a unifying analytical and optimization- based framework for the design, operation and performance evaluation of networks of dynamic autonomous agents. The fundamental view is that agents in such a network are dynamic entities that collaborate because via collaboration they can accomplish objectives and goals much better than working alone, or even accomplish objectives that they cannot...
While BGP routing datasets, consisting of raw routing data, are freely available and easy to obtain, extracting any useful information is tedious. Currently, researcher and network operators implement their own custom data processing tools and scripts. A single tool that provides easy access to the information within large raw BGP datasets could be used by both communities to avoid re-writing these...
Self-propagating code (worms) and distributed denial of service (DDoS) attacks are the most frequent and quite devastating attacks on communication networks and the Internet. We provide novel formulations for the rapid detection of these attacks in the control-theoretic framework of change detection. We present algorithms that effectively can detect worms from their temporal spreading characteristics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.