Learn More
—In this paper, we address the beacon congestion issue in Vehicular Ad Hoc Networks (VANETs) due to its devastating impact on the performance of ITS applications. The periodic beacon broadcast may consume a large part of the available bandwidth leading to an increasing number of collisions among MAC frames, especially in case of high vehicular density. This(More)
— In this paper, we address the problem of cooperative black hole attack, one of the major security issues in mobile ad hoc networks. The aim of this attack is to force nodes in the network to choose hostile nodes as relays to disseminate the partial topological information, thereby exploiting the functionality of the routing protocol to retain control(More)
— The most commonly used medium access mechanism in WLAN is based on the CSMA/CA protocol. This protocol schedules properly the access to the medium among all competing nodes. However, in a hostile environment, such as wireless local area networks (WLANs), selfish or greedy behaving nodes may prefer to decline the proper use of the protocol's rules in order(More)
SUMMARY The most commonly used medium access mechanism in wireless mesh networks is based on the CSMA/CA protocol. This protocol schedules properly the access to the medium among all the competing nodes. However, in a hostile environment, such as wireless mesh networks (WMNs), selfish or greedy behaving nodes may prefer to decline the proper use of the(More)