• Publications
  • Influence
Security for Wireless Ad Hoc Networks
Preface. Foreword. Acknowledgments. 1 Introduction. 1.1 Definition of Wireless Ad Hoc Networks. 1.2 Applications of Wireless Ad Hoc Networks. 1.3 Threats, Attacks, and Vulnerabilities. 1.3.1 Threats.Expand
  • 146
  • 12
Fair bandwidth sharing among adaptive and non-adaptive flows in the Internet
TLDR
The problem of fair bandwidth sharing among adaptive (TCP) and non-adaptive (i.e. CBR-UDP) flows at an Internet gateway is considered. Expand
  • 106
  • 12
  • PDF
Voice performance in WLAN networks - an experimental study
TLDR
In this work, we measure wireless local area network (WLAN) voice performance and capacity. Expand
  • 129
  • 11
  • PDF
Location dependent key management using random key-predistribution in sensor networks
  • F. Anjum
  • Computer Science
  • WiSe '06
  • 28 September 2006
TLDR
We propose a location aware approach for key management in sensor networks that does not require any knowledge about the deployment of sensor nodes. Expand
  • 54
  • 5
Comparative study of various TCP versions over a wireless link with correlated losses
TLDR
In this paper, we investigate the behavior of the various Transmission Control Protocol (TCP) algorithms over wireless links with correlated packet losses. Expand
  • 46
  • 4
  • PDF
A low-cost robust localization scheme for WLAN
TLDR
We propose a low-cost secure localization scheme based on the current access point (AP) capability of transmitting at different power levels. Expand
  • 21
  • 4
Balanced-RED: An Algorithm to Achieve Fairness in the Internet
TLDR
We provide a gateway algorithm that provides fairness to the different flows passing through a gateway irrespective of whether the flow incorporates end-to-end feedback or not. Expand
  • 45
  • 3
  • PDF
Client assisted location data acquisition scheme for secure enterprise wireless networks
TLDR
We propose a new data collection scheme for building a lookup table using client assistance in an enterprise wireless environment using sniffers, which monitor client signal strength. Expand
  • 27
  • 3
Location dependent key management in sensor networks without using deployment knowledge
  • F. Anjum
  • Computer Science
  • Wirel. Networks
  • 1 August 2010
TLDR
In this paper we propose an approach for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. Expand
  • 23
  • 3
LiPaD: lightweight packet drop detection for ad hoc networks
  • F. Anjum, R. Talpade
  • Computer Science
  • IEEE 60th Vehicular Technology Conference, . VTC…
  • 26 September 2004
TLDR
We present a scalable, effective and practical approach for detection of packet-drop attacks in ad hoc networks in which malicious network nodes are suspected of dropping packets. Expand
  • 39
  • 3