Mobile and wireless communication networks : IFIP TC6/WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004), October 25-27, 2004, Paris, France /

Saved in:
Bibliographic Details
Meeting name:IFIP TC6/WG6.8 Conference on Mobile and Wireless Communication Networks (2004 : Paris, France)
Imprint:New York : Springer, 2005.
Description:1 online resource (508 pages) : illustrations.
Language:English
Series:International federation for Information Processing ; 162
International Federation for Information Processing (Series) ; 162.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11065494
Hidden Bibliographic Details
Other authors / contributors:Belding-Royer, Elizabeth M.
Al Agha, Khaldoun.
Pujolle, G., 1949-
International Federation for Information Processing.
ISBN:038723148X
9780387231488
0387231501
9780387231501
1280427396
9781280427398
Notes:Includes bibliographical references.
Print version record.
Summary:Annotation This book draws together papers presented at the IFIP/IEEE Sixth Conference on Mobile and Wireless Communications. It focuses on the convergence of mobile wireless networks and the Internet, in particular, integrating stand-alone mobile networks with infrastructure wireless networks to create more robust and accommodating wireless networks.
Other form:Print version: IFIP TC6/WG6.8 Conference on Mobile and Wireless Communication Networks (2004 : Paris, France). Mobile and wireless communication networks. New York : Springer, ©2005 038723148X
Description
Summary:Mobile Ad hoc NETworks (MANETs) has attracted great research interest in recent years. A Mobile Ad Hoc Network is a self-organizing multi-hop wireless network where all hosts (often called nodes) participate in the routing and data forwarding process. The dependence on nodes to relay data packets for others makes mobile ad hoc networks extremely susceptible to various malicious and selfish behaviors. This point is largely overlooked during the early stage of MANET research. Many works simply assume nodes are inherently cooperative and benign. However, experiences from the wired world manifest that the reverse is usually true; and many works [3] [10] [9] [8] [12] [19] have pointed out that the impact of malicious and selfish users must be carefully investigated. The goal of this research is to address the cooperation problem and related security issues in wireless ad hoc networks. As a rule of thumb, it is more desirable to include security mechanisms in the design phase rather than continually patching the system for security breaches. As pointed out in [2] [1], there can be both selfish and malicious nodes in a mobile ad hoc network. Selfish nodes are most concerned about their energy consumption and intentionally drop packets to save power. The purpose of malicious nodes, on the other hand, is to attack the network using various intrusive techniques. In general, nodes in an ad hoc network can exhibit Byzantine behaviors.
Physical Description:1 online resource (508 pages) : illustrations.
Bibliography:Includes bibliographical references.
ISBN:038723148X
9780387231488
0387231501
9780387231501
1280427396
9781280427398