Learn More
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper , we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one,(More)
— Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their(More)
Admission control of flows is essential for providing quality of service in multihop wireless networks. In order to make an admission decision for a new flow, the expected bandwidth consumption of the flow must be correctly determined. Due to the shared nature of the wireless medium, nodes along a multihop path contend among themselves for access to the(More)
Routing protocols will be a fundamental piece in the operation of ad-hoc networks. These protocols must fulfil the main objective of using valid routes among the different nodes that form the net in a correct and efficient way keeping in mind the possibility that malicious nodes may exist in the net, and protecting the communication of non-allowed accesses.(More)
The Internet has evolved from a wired infrastructure to a hybrid of wired and wireless domains. As network access is now provided with much of the last mile being a mobile environment, delivering rich multimedia to mobile users is now a necessity. However, despite the advent of new technology and standards for broadband wireless, there is still an important(More)
Several applications have been envisioned for multihop wireless networks that require different qualities of service from the network. In order to support such applications, the network must control the admission of flows. To make an admission decision for a new flow, the expected bandwidth consumption of the flow must be correctly determined. Due to the(More)
Existing solutions for QoS-aware routing in mobile multihop networks attempt to discover a QoS-satisfactory route for the user at the user's current location. If a suitable route is not available at the current location, the user is denied access. This approach does not take advantage of the special characteristics of mobile multihop networks. That is,(More)
Please find enclosed our article revised to address all reviewers' comments. Our dilemma is that while our original submission was 17 pages, our revision is limited to 12 pages, and the reviewers' comment mainly were concerned with omissions. Therefore, we have provided many more details in this cover letter than appear in our revision. The simplest concern(More)
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carrier-sensing (CS) range. Hence, operations that depend on and can potentially affect the state of the shared medium, such as admission control, require coordination and information sharing among these nodes. The CS range of wireless nodes is(More)