Topology management in ad hoc networks

L Bao, JJ Garcia-Luna-Aceves - … of the 4th ACM international symposium …, 2003 - dl.acm.org
The efficiency of a communication network depends not only on its control protocols, but
also on its topology. We propose a distributed topology management algorithm that …

Cross-feature analysis for detecting ad-hoc routing anomalies

Y Huang, W Fan, W Lee, PS Yu - 23rd International Conference …, 2003 - ieeexplore.ieee.org
With the proliferation of wireless devices, mobile ad-hoc networking (MANET) has become a
very exciting and important technology. However, MANET is more vulnerable than wired …

Experimental validation of the ns-2 wireless model using simulation, emulation, and real network

S Ivanov, A Herms, G Lukas - … in Distributed Systems-15. ITG/GI …, 2007 - ieeexplore.ieee.org
Wireless network research in the last years is often based on simulation. Ns-2 is a widely
used wireless network simulation tool for this purpose. However, there are no published …

Security in mobile ad-hoc networks

Y Zhang, W Lee - Ad hoc networks: technologies and protocols, 2005 - Springer
Security is a paramount concern in mobile ad hoc network (MANET) because of its intrinsic
vulnerabilities. These vulnerabilities are nature of MANET structure that cannot be removed …

Enabling social networking in ad hoc networks of mobile phones

E Sarigöl, O Riva, P Stuedi, G Alonso - Proceedings of the VLDB …, 2009 - dl.acm.org
This demonstration presents AdSocial, a software platform supporting social network
applications in ad hoc networks. AdSocial targets small-scale scenarios such as friends …

A specification-based intrusion detection model for OLSR

CH Tseng, T Song, P Balasubramanyam, C Ko… - Recent Advances in …, 2006 - Springer
The unique characteristics of mobile ad hoc networks, such as shared wireless channels,
dynamic topologies and a reliance on cooperative behavior, makes routing protocols …

HADOF: Defense against routing disruptions in mobile ad hoc networks

W Yu, Y Sun, KJR Liu - … IEEE 24th Annual Joint Conference of …, 2005 - ieeexplore.ieee.org
HADOF is a set of mechanisms to protect mobile ad hoc networks against routing disruption
attacks launched by inside attackers. First, each node launches a route traffic observer to …

Communications support for disaster recovery operations using hybrid mobile ad-hoc networks

W Lu, WKG Seah, EWC Peh… - 32nd IEEE Conference on …, 2007 - ieeexplore.ieee.org
During times of calamity, such as an earthquake or tsunami, rescue and recovery efforts are
usually hampered by communications failure as the incumbent communications …

Multicast scaling properties in massively dense ad hoc networks

P Jacquet, G Rodolakis - 11th International Conference on …, 2005 - ieeexplore.ieee.org
We study the benefits of multicast routing in the performance of mobile ad hoc networks. In
particular we show that if a node wishes to communicate with n distinct destinations …

Contact-based architecture for resource discovery (CARD) in large scale MANets

A Helmy, S Garg, P Pamu… - … International Parallel and …, 2003 - ieeexplore.ieee.org
In this paper we propose a novel architecture, CARD, for resource discovery in large scale
MANets that may scale up to thousands of nodes. Our mechanism is suitable for resource …