Conventional Intrusion Detection Systems / Intrusion Detection Systems / Cisco / Booz Allen Hamilton / Handheld Device Processor Memory Wireless / Intel / / /
Event
FDA Phase / Product Issues / /
Facility
Building Neighbor / Electrical Engineering Department University of Maryland / Tom Karygiannis National Institute of Standards and Technology / /
IndustryTerm
wireless connectivity / detection-based systems / similar devices / ad-hoc networks / packet classifying routers / faster processors / personal computing devices / wireless standards / ad hoc networking environment / dense networks / routing based on network / ad hoc network / GSM / dense network / wireless interfaces / online service / real-time traffic monitoring / infrastructure-based network services / evaluation algorithms / Sensor networks / ad hoc networks / technology limitations / wireless technologies / real-time traffic / wireless ad hoc networks / secure bootstrapping algorithm / secure routing protocol / mobile devices / secure routing protocols / wireless capabilities / GPRS / particular protocol / selective processing / wireless access / adaptive distributed algorithm / wireline devices / /
OperatingSystem
Linux / /
Organization
Parker and Anupam Joshi Computer Science and Electrical Engineering Department University / National Science Foundation / Mobile Ad Hoc Network / Key Distribution Center / National Institute of Standards and Technology / University of Maryland at Baltimore / Certificate Authority / /
Person
Tom Karygiannis / Jim Parker / Michaela Iorga / Anupam Joshi / /
Position
forward data packets / co-operative / /
Product
ping6 utility / HP iPAQ Headphone/Headset / This / nodes / ping6 / IPv6 / AODV / /
ProgrammingLanguage
Perl / Hoc / /
ProvinceOrState
California / /
Technology
IPv6 The AODV protocol / IPv6 / secure association The protocol / Linux / MAC address / routing protocols / packet classifying routers / private key / Perl / mobile device / evaluation algorithms / mobile devices / encryption / Ethernet / routing protocol / adaptive distributed algorithm / public key / wireless access / finite state machine / particular protocol / secure routing protocol / wireless technologies / secure routing protocols / SDRAM / GSM / same secure bootstrapping algorithm / flash / Although encryption / base AODV protocol / /