Learn More
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper , we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one,(More)
— Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their(More)
Admission control of flows is essential for providing quality of service in multihop wireless networks. In order to make an admission decision for a new flow, the expected bandwidth consumption of the flow must be correctly determined. Due to the shared nature of the wireless medium, nodes along a multihop path contend among themselves for access to the(More)
The Internet has evolved from a wired infrastructure to a hybrid of wired and wireless domains. As network access is now provided with much of the last mile being a mobile environment, delivering rich multimedia to mobile users is now a necessity. However, despite the advent of new technology and standards for broadband wireless, there is still an important(More)
Several applications have been envisioned for multihop wireless networks that require different qualities of service from the network. In order to support such applications, the network must control the admission of flows. To make an admission decision for a new flow, the expected bandwidth consumption of the flow must be correctly determined. Due to the(More)
Existing solutions for QoS-aware routing in mobile multi-hop networks attempt to discover a QoS-satisfactory route for the user at the user's current location. If a suitable route is not available at the current location, the user is denied access. This approach does not take advantage of the special characteristics of mobile multi-hop networks. That is,(More)
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carrier-sensing (CS) range. Hence, operations that depend on and can potentially affect the state of the shared medium, such as admission control, require coordination and information sharing among these nodes. The CS range of wireless nodes is(More)
  • 1