... of
Interaction and System Design
School of Engineering
Blekinge Institute of Technology
Box 520
SE – 372 25 Ronneby
Sweden
36
Security Threats in MobileAdHoc Networks
Chapter Ten
Conclusion
Mobile AdHoc ... Threats in Network Layer
22
Security Threats in MobileAdHoc Networks
6.2.2 Routing Cache Poisoning Attack
Routing cache poisoning attack uses the advantage of the promiscuous mode of routing ... Wiley and Sons, Inc., 2002.
[5] Y. Hu, A. Perrig, and D. Johnson, “
Ariadne: A Secure On- Demand Routing for AdHoc Networks,”
Proc. of MobiCom 2002, Atlanta, 2002.
[6] Y. Hu, A. Perrig, and D....
... multicast group.
2 Routingprotocols designed for mobileadhoc networks maintain only
approximate and minimal topology information, and therefore designing a
center selection heuristics require ... being done so far only consider
physically connected networks, where devices are connected together by the use of cables
and wires. Due to the wired connections among them, the locations of ... during the core
movement.
4.7 Conclusion
In this section, a distributed core selection and core migrating algorithms for mobile
ad hoc networks has been presented and debated. Because of the unrestricted...
... Buttyan and J. P. Hubaux, “Stimulating cooperation in self-organizing
mobile adhoc networks,” ACM Journal for Mobile Networks (MONET),
special issue onMobileAdHoc Networks, summer 2002. [Online].
Available: ... INTRODUCTION
I
N recent years, mobileadhoc networks have received
much attention due to their potential applications and the
proliferation of mobile devices [1], [2]. Specifically, mobile
adhoc networks ... availability in mobile
ad- hoc WANs,” in IEEE/ACM Workshop onMobileAdHoc Networking
and Computing (MobiHOC), Boston, MA, August 2000. [Online].
Available: http://icawww.epfl.ch/Publications/Buttyan/ButtyanH00.ps
[6]...
... Reliable MobileAdHoc Networks 99
Ricardo Lent and Javier Barria
ADHOCTCP: Improving TCP
Performance in AdHoc Networks 121
Seyed Mohsen Mirhosseini and Fatemeh Torgheh
Cross LayerDesign in AdHoc ... Robust Routing
for Mobile Multihop AdHoc Networks 201
Sangman Moh, Moonsoo Kang, and Ilyong Chung
A Location Prediction Based Routing Protocol
and its Extensions for Multicast and Multi-path
Routing ... and Floriano De Rango
Routing in AdHoc Networks 297
Routing in MobileAdHoc Networks 299
Fenglien Lee
Fault-Tolerant Routing
in MobileAdHoc Networks 323
B. John Oommen and Luis Rueda
LLD:...
... Ad- hocNetwork (MWAN), Proceedings of The 2005
International Workshop on Wireless Ad- hoc Networks (IWWAN '05), London, UK, 2005.
Mobile Ad- Hoc Networks: Protocol Design
32
Based on ... protocols (based on the routing information update mechanism)
Mobile Ad- Hoc Networks: Protocol Design
38
Taneja, K. & Patel, R. B. (2007). MobileAdhoc Networks: Challenges and Future, ... in MANETs.
5. Conclusions
Multi-hop mobile radio network, also called mobile ad- hocnetwork is created by a set of
mobile nodes on a shared wireless channel. This network is adaptable to the...
... in AdHoc Networks
131
during connection initiation and route switching, network supported congestion detection
and control, no retransmission time outs, decoupled congestion Control and ... comparison of TCP performance over three routingprotocols
for mobileAdhoc networks. In Proceedingsofthe2001ACM International
Symposium onMobileAdHoc Networking & Computing(MobiHoc’01), Long ...
132
When network congestion occurs, adhoc transport should adopt the same congestion
control actions as conventional TCP [24]. Here, we define congestion as queue build-up and
packets...
... Introduction
Recent advances in wireless networks have led to the introduction of a new type of networks
called Vehicular Networks. Vehicular AdHocNetwork (VANET) is a form of MobileAdHoc
Networks ... Nardelli
Design and Analysis of a Multi-level Location Information
Based Routing Scheme for MobileAdhoc Networks 473
Koushik Majumder, Sudhabindu Ray and Subir Kumar Sarkar
Power Control in AdHoc ... includes
modification in the MAC andnetwork layers.
Contents
VII
Other Topics 451
A Surveyon The Characterization of the Capacity
of AdHoc Wireless Networks 453
Paulo Cardieri and Pedro Henrique...
... maintain the routing table, and consume more bandwidth.
Fig. 6. Paths and junctions to route the packet
4.2 Position based routing
Position-based routingprotocols or geographic routingprotocols ... vehicle-induced obstruction and the
obstruction caused by other objects (e.g., buildings, overpasses, etc.).
52
Mobile Ad- Hoc Networks: Applications
20 Theor y and Applications of AdHoc Networks
100 250 ... Patterns
(random waypoint,
Manhattan grid, road-
constrained, etc.)
Fig. 1. Structure of VANET simulation environment
42
Mobile Ad- Hoc Networks: Applications
Modeling and Simulation of Vehicular Networks:...
... of platoon applications are: increase of road capacity and
efficiency, reduction in congestion, energy consumption and pollution, and enhancement of
safety and comfort. Demonstrations of cars ... applications for traffic monitoring and collision prevention,
road information services, and infotainment and so on.
However, unlike other adhoc networks, Vehicular adhoc Networks (VANETs) have their ... 49–56.
66
Mobile Ad- Hoc Networks: Applications
22 Theor y and Applications of AdHoc Networks
over time if the vehicle arrival rate remains constant. Furthermore, over a period of seconds,
the LOS conditions...
... significantly.
Considering congestion on downtown roads the situation is different. It can be s een, that the
118
Mobile Ad- Hoc Networks: Applications
14 Theory and Applications of AdHoc Networks
Fig. ... prediction androuting in adhoc wireless
networks,” in International Journal of Network Management, Wiley and Sons, Eds.,
2000.
yTra f fic Information Dissemination in Vehi cular AdHoc Networks ... (Direction-aware Function Driven Feedback-augmented Store & Forward
110
Mobile Ad- Hoc Networks: Applications
Mobile Ad- Hoc Networks: Applications
98
As a consequence, the Road Connectivity...
... of conditions.
As the consequence to deal with highly dynamic environment the conditional addressing is
considered instead of network addressing, the path maintaining instead of traditional ...
CONTEXT
MODULE
CONTEXT PROCESSING ENGINE
APPLICATION
CONTEXT
MODULE
TRANSLATION LOGIC
CONTEXT
MANAGER
CONTEXT
MANAGER
CONTEXT
MANAGER
CONTEXT ONTOLOGY
ENGINE
CONTEXT MONITORING
AND ADAPTATION
PREDICTION
SCHEDULING ... traffic congestion or denial of service.
Rushing attack
Mobile adhoc networks that use on- demand routingprotocols are vulnerable to rushing
attacks [Hu et al, 2003a]. On- demand routing protocols, ...