Advertisement

Mobile and Wireless Communication Networks

IFIP TC6/WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004) October 25–27, 2004, Paris, France

  • Elizabeth M. Belding-Royer
  • Khaldoun Al Agha
  • Guy Pujolle
Conference proceedings MWCN 2004

Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 162)

Table of contents

  1. Front Matter
    Pages I-IX
  2. Lap Kong Law, Srikanth V. Krishnamurthy, Michalis Faloutsos
    Pages 1-12
  3. André-Luc Beylot, Riadh Dhaou, Vincent Gauthier, Monique Becker
    Pages 13-22
  4. Davy Darche, Francis Lepage, Eric Gnaedinger
    Pages 35-45
  5. Guillaume Chelius, Claude Chaudet
    Pages 47-58
  6. Sonia Waharte, Kevin Ritzenthaler, Raouf Boutaba
    Pages 59-70
  7. Sandro Grech, Javier Poncela, Pedro Serna
    Pages 71-82
  8. Nadav Lavi, Israel Cidon, Idit Keidar
    Pages 95-106
  9. Hideki Hayashi, Takahiro Hara, Shojiro Nishio
    Pages 131-142
  10. Mouna Benaissa, Vincent Lecuire, D.W. McClary, Violet R. Syrotiuk
    Pages 143-154
  11. Carlos T. Calafate, Manuel P. Malumbres, Pietro Manzoni
    Pages 155-166
  12. Mouna Benaissa, Vincent Lecuire
    Pages 167-178
  13. Emmanuelle Vivier, Michel Terré, Bernard Fino
    Pages 179-190
  14. João H. Kleinschmidt, Marcelo E. Pellenz, Luiz A. P. Lima Jr.
    Pages 203-213
  15. Anindo Mukherjee, Hongmei Deng, Dharma P. Agrawal
    Pages 215-226
  16. Claude Castelluccia, Francis Dupont, Gabriel Montenegro
    Pages 239-249
  17. Xiaoyun Xue, Jean Leneutre, Jalel Ben-Othman
    Pages 251-262
  18. Gilles Berger-Sabbatel, Andrzej Duda, Martin Heusse, Franck Rousseau
    Pages 263-274
  19. Romain Mellier, Jean-Frederic Myoupo, Vlady Ravelomanana
    Pages 287-298
  20. John P. Mullen, Timothy Matis, Smriti Rangan
    Pages 299-310
  21. Yue Fang, A. Bruce McDonald
    Pages 311-322
  22. Michael Gerharz, Christian de Waal, Peter Martini
    Pages 323-334
  23. Martin Roth, Stephen Wicker
    Pages 335-346
  24. T. Fevens, I. T. Haque, L. Narayanan
    Pages 347-357
  25. Jain Shing Liu, Chun-Hung Richard Lin
    Pages 359-370
  26. Howard CheHao Chang, Haining Du, Joey Anda, Chen-Nee Chuah, Dipak Ghosal, H. Michael Zhang
    Pages 371-382
  27. Franck Legendre, Marcelo Dias de Amorim, Serge Fdida
    Pages 383-394
  28. Philipp Hofmann, Christian Bettstetter, Jeremie Wehren, Christian Prehofer
    Pages 395-406
  29. Flaminio Borgonovo, Matteo Cesana, Luigi Fratta
    Pages 407-418
  30. Erwan Ermel, Anne Fladenmuller, Guy Pujolle, André Cotton
    Pages 449-460
  31. Al Harris, Cigdem Sengul, Robin Kravets, Prashant Ratanchandani
    Pages 461-472
  32. Daniel de O. Cunha, Luís Henrique M. K. Costa, Otto Carlos M. B. Duarte
    Pages 473-484
  33. Tamer Nadeem, Suman Banerjee, Archan Misra, Ashok Agrawala
    Pages 485-496
  34. Roberto Montemanni, Luca Maria Gambardella
    Pages 497-508

About these proceedings

Introduction

Mobile Ad hoc NETworks (MANETs) has attracted great research interest in recent years. A Mobile Ad Hoc Network is a self-organizing multi-hop wireless network where all hosts (often called nodes) participate in the routing and data forwarding process. The dependence on nodes to relay data packets for others makes mobile ad hoc networks extremely susceptible to various malicious and selfish behaviors. This point is largely overlooked during the early stage of MANET research. Many works simply assume nodes are inherently cooperative and benign. However, experiences from the wired world manifest that the reverse is usually true; and many works [3] [10] [9] [8] [12] [19] have pointed out that the impact of malicious and selfish users must be carefully investigated. The goal of this research is to address the cooperation problem and related security issues in wireless ad hoc networks. As a rule of thumb, it is more desirable to include security mechanisms in the design phase rather than continually patching the system for security breaches. As pointed out in [2] [1], there can be both selfish and malicious nodes in a mobile ad hoc network. Selfish nodes are most concerned about their energy consumption and intentionally drop packets to save power. The purpose of malicious nodes, on the other hand, is to attack the network using various intrusive techniques. In general, nodes in an ad hoc network can exhibit Byzantine behaviors.

Keywords

Bluetooth IPv6 QoS Session WLAN configuration multimedia optimization sensor network

Editors and affiliations

  • Elizabeth M. Belding-Royer
    • 1
  • Khaldoun Al Agha
    • 2
  • Guy Pujolle
    • 2
  1. 1.University of CaliforniaSanta BarbaraUSA
  2. 2.University of Paris XIFrance

Bibliographic information

  • DOI https://doi.org/10.1007/b100798
  • Copyright Information International Federation for Information Processing 2005
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-23148-8
  • Online ISBN 978-0-387-23150-1
  • Series Print ISSN 1571-5736
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering