Results 301 to 310 of about 80,949 (337)
Some of the next articles are maybe not open access.
Routing path authentication in link-state routing protocols
Network Security, 2012The rapid growth of the Internet has meant that many services are regarded as critical – such as web applications, including email and e-commerce, and real-time applications, such as video conferencing and Voice over IP (VoIP). These rely on the Internet infrastructure to provide them with reliable, efficient and secure communications.
openaire +1 more source
Spatiotemporal neural networks for link-state routing protocols
1996 IEEE International Symposium on Circuits and Systems. Circuits and Systems Connecting the World. ISCAS 96, 2002This paper discusses the application of a mixed-signal VLSI realization of a recurrent spatiotemporal neural network to a computer network routing. The neural network exhibits a regular interconnect structure and uses simple processing units in a combination which is well suited for VLSI implementation with a standard fabrication process.
N. Shaikh-Husin, J.L. Meador
openaire +1 more source
Trust aware cooperative optimised link state routing protocol
International Journal of Systems, Control and Communications, 2017Optimised link state routing OLSR protocol is a popular proactive routing protocol for wireless ad-hoc networks WANETs. The functionality of OLSR protocol such as selection of multi-point relays, controlling the flooding of link state information and preparation of the routing table is depending upon the cooperation among the nodes in the network ...
Raghu Vamsi Potukuchi, Krishna Kant
openaire +1 more source
Statistical anomaly detection for link-state routing protocols
Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256), 2002The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against the OSPF (open shortest path first) routing protocol. This paper presents the implementation and experiments of JiNao's statistical intrusion detection module.
null Diheng Qu +7 more
openaire +1 more source
MOLSR: Mobile-agent based optimized Link State Routing Protocol
2015 International Wireless Communications and Mobile Computing Conference (IWCMC), 2015The popularity of Mobile Ad Hoc networks (MANETs) continues to increase due to the technological advances in wireless radios and wireless networks. Given the unpredictability of the wireless medium, one of the major challenges in MANETs remains to be the efficiency of the underlying routing protocol.
Wassim El-Hajj +3 more
openaire +1 more source
Logical Wormhole Prevention in Optimized Link State Routing Protocol
IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, 2007A particularly severe attack on routing protocols in ad hoc networks is the so-called wormhole attack in which two or more colluding attacking nodes record packets at one location, and tunnel them to another location for a replay at that remote location.
Azeddine Attir +3 more
openaire +1 more source
Efficient flooding for reliability in link-state routing protocols
2012 International Conference on ICT Convergence (ICTC), 2012In this paper we propose an efficient flooding process. Link state routing protocol has been widely employed in wired network applications. When network topology change occurs, a Link State Advertisement (LSA) is generated and flooded into the rest of the devices of the network.
Seung Hwan Lee, Seung Hyong Rhee
openaire +1 more source
Fault management for networks with link state routing protocols
2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), 2004For network fault management, we present a new technique that is based on on-line monitoring of networks with link state routing protocols, such as OSPF (open shortest path first) and integrated IS-IS. Our approach employs an agent that monitors the on-line information of the network link state database, analyzes the events generated by network faults ...
R. Hao, D. Lee, J. Ma, J. Yang
openaire +1 more source
Performance analysis of modified secure link state routing protocol
International Journal of Networking and Virtual Organisations, 2012Secure link state protocol (SLIP) is the most effective scheme proposed so far to protect the internet infrastructure against routing table 'poisoning' attacks. The major disadvantage of the SLIP is its failure in protecting the network in the case of inactive routing table attacks and in some cases of proactive attacks. A successful attempt is carried
openaire +1 more source
A generic protocol for multipoint connections under link-state routing
Proceedings of 16th International Conference on Distributed Computing Systems, 2002We propose a protocol for the construction and maintenance of multipoint connections (MCs). The protocol is based on link-state routing: information regarding multipoint connections is broadcast to network switches, which perform all computations locally.
null Yih Huang, P.K. McKinley
openaire +1 more source

