Oscar F. Gonzalez

Learn More
—Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. For example, misbehaving nodes can cause general network disruption by not forwarding packets on behalf of other nodes in the network. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the(More)
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power, or for other reasons. In this paper,(More)
Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual(More)
Devices in a mobile ad hoc network (MANET) may misbehave by dropping packets that are forwarded in the network, for example because they are malicious and deliberately intend to disrupt the network or because they are selfish and wish to conserve their own limited resources such as power. In this paper, we present a mechanism that enables the detection of(More)
MANET is mobile ad-hoc network. It is simply a collection of nodes where each node acts as independent router or host. Mobility is the main characteristics of MANET. Therefore routing protocol is required that adapts whenever topology changes. Secure data transmission is the main issue in MANET. The enhancement in the secure data transmission in MANET using(More)
Efficient Web Services (WS) based network monitoring of managed devices is a difficult task due to the relatively big overhead WS impose. In the past we proposed mechanisms to perform distributed monitoring efficiently, minimizing the relevant overhead. Standardization of WS operations is also important in order to achieve interoperability. The WS Resource(More)
  • 1