Skip to main content

Mobile and Wireless Communications Networks

IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004) October 25-27, 2004 Paris, France

  • Conference proceedings
  • © 2005

Overview

  • Presents the most current research in Mobile and Wireless Communications
  • Includes supplementary material: sn.pub/extras

Part of the book series: IFIP Advances in Information and Communication Technology (IFIPAICT, volume 162)

Included in the following conference series:

Conference proceedings info: MWCN 2004.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (42 papers)

Other volumes

  1. Mobile and Wireless Communication Networks

Keywords

About this book

Mobile Ad hoc NETworks (MANETs) has attracted great research interest in recent years. A Mobile Ad Hoc Network is a self-organizing multi-hop wireless network where all hosts (often called nodes) participate in the routing and data forwarding process. The dependence on nodes to relay data packets for others makes mobile ad hoc networks extremely susceptible to various malicious and selfish behaviors. This point is largely overlooked during the early stage of MANET research. Many works simply assume nodes are inherently cooperative and benign. However, experiences from the wired world manifest that the reverse is usually true; and many works [3] [10] [9] [8] [12] [19] have pointed out that the impact of malicious and selfish users must be carefully investigated. The goal of this research is to address the cooperation problem and related security issues in wireless ad hoc networks. As a rule of thumb, it is more desirable to include security mechanisms in the design phase rather than continually patching the system for security breaches. As pointed out in [2] [1], there can be both selfish and malicious nodes in a mobile ad hoc network. Selfish nodes are most concerned about their energy consumption and intentionally drop packets to save power. The purpose of malicious nodes, on the other hand, is to attack the network using various intrusive techniques. In general, nodes in an ad hoc network can exhibit Byzantine behaviors.

Editors and Affiliations

  • University of California, Santa Barbara, USA

    Elizabeth M. Belding-Royer

  • University of Paris XI, France

    Khaldoun Agha, Guy Pujolle

Bibliographic Information

Publish with us