Skip to Main Content
Ad Hoc Mobile Wireless Networks, 2nd Edition
book

Ad Hoc Mobile Wireless Networks, 2nd Edition

by Subir Kumar Sarkar, T.G. Basavaraju, C. Puttamadappa
April 2016
Intermediate to advanced content levelIntermediate to advanced
349 pages
8h 42m
English
CRC Press
Content preview from Ad Hoc Mobile Wireless Networks, 2nd Edition
36
Ad HoC Mobile Wireless netWorks
1.3.3.2.4 Jellyfish Attack Similarly to the black hole attack, a jellyfish
attacker first needs to intrude into the forwarding group and then it
delays data packets unnecessarily for some amount of time before for-
warding them. is results in significantly high end-to-end delay and
delay jitter and thus degrades the performance of real-time applications.
1.3.3.3 Interconnection of Mobile Ad Hoc Networks and the Internet e
interconnection of mobile ad hoc networks to fixed IP networks is one
of the topics receiving more attention within the MANET working
group of the IETF as well as in many research projects funded by the
European Union. Several solutions have recently been proposed, but
at this time it is u
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ad Hoc Mobile Wireless Networks: Protocols and Systems

Ad Hoc Mobile Wireless Networks: Protocols and Systems

C.-K. Toh - Ph.D.
Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Jing (Selina) He, Mr. Mr. Shouling Ji, Yingshu Li, Yi Pan

Publisher Resources

ISBN: 9781466514478