The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many denial-of-service (DOS) attacks in wireless networks, such as jamming, will cause significant performance degradation to the network and thus need to be detected quickly. This becomes more important in a cognitive wireless network employing dynamic spectrum access (DSA), where it is easier for the attackers to launch DOS attacks. For instance, the attackers may pretend to be a licensed primary...
In our previous works, we defined a novel routing metric for organization-aware multihop wireless networks. We demonstrated that our proposed routing protocol with this new metric provides the much needed survivability and efficiency in battlefield environments when keeping the cross-organization data transfer at a low level. In this paper, we take one step further and propose ORION, a framework for...
In a large mission critical wireless ad hoc network, heterogeneous nodes with different capabilities and nodes from different organizations may be deployed within the same geographical area. This is typical for many mission critical applications such as military networks. For such applications, on one hand, a node from one organization may collaborate with the nodes from a different organization for...
Providing security and privacy to users are critical in wireless mesh networks (WMNs). In this paper, a distributed security architecture is introduced to manage the mesh clients and a secure routing scheme that preserves the privacy of the end-users is proposed. In order to maximize routing efficiency, key indexing is used and symmetric cipher is employed in most part of the proposed scheme to reduce...
In this paper, we investigate the issues of survivability and efficiency in a heterogeneous mobile ad hoc network (MANET) and Sensor network as a combined network where the communications is achieved using a mixed MANET and Sensor Network, referred to as SMANET for supporting mission critical applications. Using the cluster managed SMANET where, heterogeneous nodes with different capabilities and...
In a large mobile ad hoc network, nodes may be organized by a hierarchical address system that reflects the organizational structure of the users within the network. This is typical for many mission-critical applications such as military networks. For such applications, it is important to keep cross-organization data transfer at the lowest possible level for minimal disruption of the traffic within...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.