Learn More
IP version 6 (IPv6) is being designed within the IETF as a replacement for the current version of the IP protocol used in the Internet (IPv4). We have designed protocol enhancements for IPv6, known as Mobile IPv6, that allow transparent routing of IPv6 packets to mobile nodes, taking advantage of the opportunities made possible by the design of a new(More)
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the limited transmission range of wireless network interfaces, multiple network "hops" may be needed for one node to exchange data with another across the network. In(More)
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two(More)
An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vector approaches, they have generally assumed a trusted(More)
This survey covers rollback-recovery techniques that do not require special language constructs. In the first part of the survey we classify rollback-recovery protocols into <i>checkpoint-based</i> and <i>log-based.</i> <i>Checkpoint-based</i> protocols rely solely on checkpointing for system state restoration. Checkpointing can be coordinated,(More)
The problem of <i>idle listening</i> is one of the most significant sources of energy consumption in wireless sensor nodes, and many techniques have been proposed based on <i>duty cycling</i> to reduce this cost. In this paper, we present a new <i>asynchronous</i> duty cycle MAC protocol, called <i>Receiver-Initiated MAC</i> (<i>RI-MAC</i>), that uses(More)
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides(More)
The use of on-demand techniques in routing protocols for multi-hop wireless ad hoc networks has been shown to have significant advantages in terms of reducing the routing protocol's overhead and improving its ability to react quickly to topology changes in the network. A number of on-demand <i>multicast</i> routing protocols have been proposed, but each(More)