MILCOM 2002. Proceedings
DOI: 10.1109/milcom.2002.1179592
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion-resistant ad hoc wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
17
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 3 publications
0
17
0
Order By: Relevance
“…Several authors e.g. [8], [12], assume operation in promiscuous mode given its advantages (e.g., neighborhood monitoring).…”
Section: System Modelmentioning
confidence: 99%
“…Several authors e.g. [8], [12], assume operation in promiscuous mode given its advantages (e.g., neighborhood monitoring).…”
Section: System Modelmentioning
confidence: 99%
“…Consequently, a path verification mechanism (i.e., a mechanism to ensure that each node along an end-end path is correctly forwarding packets) is necessary to observe and identify such a misbehaving node. The detection of compromised nodes is particularly important in military MANETs [11,19,20] and other networks in which nodes can be compromised either physically or remotely.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional clustering algorithm for ad hoc network can effectively achieve a single point of network stability, and there is no efficient algorithm for long-term stability. Improvements have been made in this context traditional LEACH network clustering algorithm, based on efficient cluster head node using residual energy and communications networking sensor networks nodes remaining weaknesses in the energy networks and strengthening, improving the overall balance and effectiveness of the network, and ultimately to improve the long-term stability in wireless ad hoc networks sensor networks.Keywor ds: Wireless Ad Hoc Networks﹒Sensor networks﹒Clustering algorithm node heterogeneous 1 Intr oduction Many excellent characteristics for wireless ad hoc networks in the area of civilian and military traffic are occupying a place providing a favorable basis [1]. First, the network provides a cheap and rapid deployment of network may be organized.…”
mentioning
confidence: 99%
“…Keywor ds: Wireless Ad Hoc Networks﹒Sensor networks﹒Clustering algorithm node heterogeneous 1 Intr oduction Many excellent characteristics for wireless ad hoc networks in the area of civilian and military traffic are occupying a place providing a favorable basis [1]. First, the network provides a cheap and rapid deployment of network may be organized.…”
mentioning
confidence: 99%