Select All | Select None
You can now keep track of new articles from Ad Hoc Networks on your personalized homepage!
Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide range of attacks against control traffic (such as wormholes, rushing,...
The production of cheap CMOS cameras, which are able to capture rich multimedia content, combined with the creation of low-power circuits, gave birth to what is called Wireless Multimedia Sensor Networks (WMSNs) . WMSNs introduce several new research challenges, mainly related to mechanisms to...
Flooding-type Denial-of-Service ( DoS ) and Distributed DoS ( DDoS ) attacks can cause serious problems in mobile multi-hop networks due to its limited network/host resources. Attacker traceback is a promising solution to take a proper countermeasure near attack origins, for forensics and to...
A covert channel is a concealed communication path embedded in an overt one. Existence of covert channels violates both secrecy and integrity properties of trusted systems. While past covert analysis has been mainly focused on wired networks, the wireless communication environment involves...
In Mobile Ad-Hoc Networks (MANETs), establishing trust relationships between the nodes in a decentralized fashion has been an important research issue for a long time. If the sender nodes accurately identify the legitimate nodes in the network, a robust routing can be provided while mitigating...
This article is concerned with the challenges associated with supporting communication in disconnected MANETs with such a sparse population of nodes and so little (or no) fixed infrastructure that the network graph is rarely, if ever, connected. The networks considered are autonomous and do not...
In this paper, we investigate the low coverage problem of efficient broadcast protocols in wireless ad hoc networks with realistic physical layer models. To minimize energy consumption, efficient protocols aim to select small set of forward nodes and minimum transmission radii. In ideal physical...
results per page
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.