Abstract. Network hazards like attacks or misbehaving nodes are still a great obstacle for network operators. Distributed denial of service attacks and worm propagations do not only affect the attacked nodes but also the network itself by wasting network resources. In wireless ad hoc networks even more hazards exist due to its self-organizing characteristic. A detection of such network hazards as early as possible enables a fast deployment of appropriate countermeasures and thereby significantly improves network operation. Our proposed detection system uses programmable network technology to deploy such a system within the network itself. Doing this without influencing the routing performance seriously demands a resource saving architecture...
The evolution of wireless network technologies andthe recent advances in mobile computing hardware h...
The adhoc networks are the briefly established wireless networks that don’t need to be mounted infras...
This dissertation explores technological advances for network programmability and softwarization to ...
Abstract. Today, the Internet is used by companies frequently since it simplifies daily work, speeds...
This thesis deals with wormhole attack discovery in mobile wireless ad hoc networks. Two separate ap...
Abstract. Sensors in a wireless sensor network depend on their neigh-bours to route their messages. ...
Abstract- Modern network systems are plagued with unknown attacks every time. To detect these attack...
This paper presents the preliminary architecture of a network level intrusion detection system. The ...
This dissertation investigates two research problems to protect wireless network topology and routin...
In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network application...
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many...
As wireless networks become more commonplace, it is important to have methods to detect attacks agai...
Abstract—- The wormhole attack is considered a serious threat to the security in multi-hop ad hoc ne...
Wireless networks are playing very important role in the present world. Mobile Ad hoc Networks (MANE...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
The evolution of wireless network technologies andthe recent advances in mobile computing hardware h...
The adhoc networks are the briefly established wireless networks that don’t need to be mounted infras...
This dissertation explores technological advances for network programmability and softwarization to ...
Abstract. Today, the Internet is used by companies frequently since it simplifies daily work, speeds...
This thesis deals with wormhole attack discovery in mobile wireless ad hoc networks. Two separate ap...
Abstract. Sensors in a wireless sensor network depend on their neigh-bours to route their messages. ...
Abstract- Modern network systems are plagued with unknown attacks every time. To detect these attack...
This paper presents the preliminary architecture of a network level intrusion detection system. The ...
This dissertation investigates two research problems to protect wireless network topology and routin...
In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network application...
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many...
As wireless networks become more commonplace, it is important to have methods to detect attacks agai...
Abstract—- The wormhole attack is considered a serious threat to the security in multi-hop ad hoc ne...
Wireless networks are playing very important role in the present world. Mobile Ad hoc Networks (MANE...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
The evolution of wireless network technologies andthe recent advances in mobile computing hardware h...
The adhoc networks are the briefly established wireless networks that don’t need to be mounted infras...
This dissertation explores technological advances for network programmability and softwarization to ...