Notice of Violation of IEEE Publication Principles: A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks

M Jain, H Kandwal - … on Advances in Computing, Control, and …, 2009 - ieeexplore.ieee.org
… In this paper, we are concerned of a particularly severe security attack that affects the ad hoc
… to its impact and threat on ad hoc networks. We finally summarize and conclude this paper. …

Notice of Violation of IEEE Publication Principles: Performance enhancements of ad hoc networks with localized route repair

R Duggirala, R Gupta, QA Zeng… - IEEE transactions on …, 2003 - ieeexplore.ieee.org
… Abstract—In ad hoc networks, information transfer is achieved … address this inherent
characteristic of ad hoc networks, we … We have studied existing routing protocols for ad hoc

Notice of Violation of IEEE Publication Principles: Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks

JH Song, F Hong, Y Zhang - 2006 Seventh International …, 2006 - ieeexplore.ieee.org
… As we know, in an ad hoc wireless network where wired infrastructures are not feasible,
energy and bandwidth conversation are the two key elements presenting research challenges. …

Notice of Violation of IEEE Publication Principles: An adaptive routing protocol for ad hoc peer-to-peer networks

L Gatani, GL Re, S Gaglio - … symposium on a world of wireless …, 2005 - ieeexplore.ieee.org
Ad hoc networks are characterized by the lack of required infrastructure, … ad hoc addressing
and self-routing. Several approaches and protocols have been proposed to address ad hoc

Notice of Violation of IEEE Publication Principles: Auto configuration in Mobile Ad hoc Networks

UG Swarnapriyaa, V Vinodhini… - … on Innovations in …, 2011 - ieeexplore.ieee.org
… -organizing, we mean that an ad hoc network can be formed, … By infrastructure-less, we
mean that an ad hoc network can be … By multi-hop wireless, we mean that in an ad hoc network …

Notice of Violation of IEEE Publication Principles: Security in Vehicular Ad-hoc Networks

U Sehgal, K Kaur, P Kumar - 2009 Second International …, 2009 - ieeexplore.ieee.org
… not sufficient to provide efficient Ad-hoc operations. The wireless nature of … of Ad-hoc
environment. We focus on three areas of Ad-hoc networks, key exchange and management, Ad-hoc

Notice of Violation of IEEE Publication Principles: A Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks

RK Jha, SV Limkar, UD Dalal - 2010 3rd International …, 2010 - ieeexplore.ieee.org
Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered
Routing Algorithm (TORA) routing protocol is for mobile ad hoc … an ad hoc network …

Notice of Violation of IEEE Publication Principles: An Intrusion Detection Architecture for Ad Hoc Network Based on Artificial Immune System

H Xie, Z Hui - … Seventh International Conference on Parallel and …, 2006 - ieeexplore.ieee.org
… Mobile Ad Hoc Networks are vulnerable to security attacks that … Construction of security
mechanisms for Mobile Ad Hoc Networks is … dys-functions or attacks in a Mobile Ad Hoc Network. …

Notice of Violation of IEEE Publication Principles: An intrusion detection system for AODV

B Sun, H Chen, L Li - 10th IEEE International Conference on …, 2005 - ieeexplore.ieee.org
… for mobile ad hoc networks. In particular, we employ specification-based techniques to
monitor the ad hoc on-demand distance vector (AODV) routing protocol, a widely adopted ad hoc

Notice of Violation of IEEE Publication Principles: A New Scheme for on-Demand Group Mobility Clustering in Mobile Ad hoc Networks

A Dana, AM Yadegari, A Salahi… - 2008 10th …, 2008 - ieeexplore.ieee.org
… Abstract - Clustering is an important concept for mobile ad hoc … Many clustering protocols
for mobile ad hoc networks (… A large variety of approaches for ad hoc clustering have been …