• Citations Per Year
Learn More
Many intrusion detection algorithms have been proposed to detect network attacks on Mobile Ad-Hoc Networks (MANET). Most of such proposals require extensive modifications to routing algorithms or lower layers which might not be always feasible in practice. This paper proposes a simple but non-trivial scheme TraceGray, that uses mobile agents (MA) to carry(More)
Traceroute program is extensively used in wired networks to track the route packets take on their way to a destination. However, traceroute is often less effective in wireless networks where broken routes are too common. In this paper, the design of wtracert is presented that employs optimal timeouts to provide a faster implementation of the traditional(More)
In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless environment is an easy target for intruders looking for the possible(More)
Vehicles of today are increasingly being networked via various available networking technologies. IEEE 802.11p advocates Vehicle-to-Vehicle and Vehicle-to-Infrastructure communication via Wireless Access in Vehicular Environments (WAVE) between vehicles in the frequency range of 5.9 GHz. Also, IEEE 802.11j proposes the usage of 4.9 GHz frequency range for(More)
  • 1