The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile opportunistic networks take advantage of contact opportunities due to the mobility of individual nodes for distributing data. Studying the inherent traits of data dissemination in mobile opportunistic networks can reveal their potential to support emerging applications, such as emergency services and mobile commerce. In this paper, we employ the Lévy mobility model to characterize the movement...
Compared with table-driven routing protocol, on-demand routing protocol lessens routing overhead dramatically. However, node unconditional broadcasting RREQ, RERR may cause great routing overhead. In order to increase link lifetime and reduce routing overhead, an improved AODV method is proposed in this paper, in which RREQ, RERR and routing table will be constrained or deleted.
Wireless mesh networking has been a cost-effective technology that provides wide-coverage broadband wireless network services. However, security and privacy in this proliferated network environment have not been widely studied. In this work, we propose a cross-layer based anomaly intrusion detection system (IDS) to accommodate the integrated property of routing protocols with link information in wireless...
Wormhole attack is a severe attack in wireless ad hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time over each link during the route establishment, which requires special hardware or causes overhead on all links even though only one link on each route could be affected by a wormhole attack. In this article, we propose an...
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our technique generalizes the monitored sequences of routing messages constructing a high-level abstract view of the protocol. The basis of our method is similar to inductive logic programming technique that derives a sound...
In this article, we present our research work in intrusion detection over wireless ad hoc network. We summarize the current intrusion detection techniques into three categories. Then we investigate detection of wormhole attack in wireless ad hoc networks. A novel end-to-end wormhole detection method is proposed
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.