Learn More
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper , we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one,(More)
— Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their(More)
Admission control of flows is essential for providing quality of service in multihop wireless networks. In order to make an admission decision for a new flow, the expected bandwidth consumption of the flow must be correctly determined. Due to the shared nature of the wireless medium, nodes along a multihop path contend among themselves for access to the(More)
The Internet has evolved from a wired infrastructure to a hybrid of wired and wireless domains. As network access is now provided with much of the last mile being a mobile environment, delivering rich multimedia to mobile users is now a necessity. However, despite the advent of new technology and standards for broadband wireless, there is still an important(More)
Existing solutions for QoS-aware routing in mobile multi-hop networks attempt to discover a QoS-satisfactory route for the user at the user's current location. If a suitable route is not available at the current location, the user is denied access. This approach does not take advantage of the special characteristics of mobile multi-hop networks. That is,(More)
Several applications have been envisioned for multihop wireless networks that require different qualities of service from the network. In order to support such applications, the network must control the admission of flows. To make an admission decision for a new flow, the expected bandwidth consumption of the flow must be correctly determined. Due to the(More)
In the current era of wireless network, popularity of MANET is increasing at a very fast pace. Reason for this increased attention is the wide range of multimedia applications running in an infrastructure less environment. Because of the infrastructure less environment, limited power and dynamic topology it becomes very difficult to provide a secure(More)
Kaman is the extension of Kerberos protocol; with the use of Kaman nodes in the ad hoc network are authenticated by the secure server. This posed the remedial venture to large number of attacks like replay attack, fabrication, eavesdropping etc Kaman provides secure solution to the problem of secure channel establishment, secure exchange of session keys and(More)
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carrier-sensing (CS) range. Hence, operations that depend on and can potentially affect the state of the shared medium, such as admission control, require coordination and information sharing among these nodes. The CS range of wireless nodes is(More)
Please find enclosed our article revised to address all reviewers' comments. Our dilemma is that while our original submission was 17 pages, our revision is limited to 12 pages, and the reviewers' comment mainly were concerned with omissions. Therefore, we have provided many more details in this cover letter than appear in our revision. The simplest concern(More)