Sciweavers

261 search results - page 3 / 53
» Preventing selfish behavior in Ad Hoc networks
Sort
View
ICC
2009
IEEE
201views Communications» more  ICC 2009»
13 years 3 months ago
Analyzing Selfish Topology Control in Multi-Radio Multi-Channel Multi-Hop Wireless Networks
Typically, topology control is perceived as a per-node transmit power control process that achieves certain networklevel objectives. We take an alternative approach of controlling ...
Ramakant S. Komali, Allen B. MacKenzie
CIIT
2007
161views Communications» more  CIIT 2007»
13 years 6 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 6 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
WS
2003
ACM
13 years 10 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
JCM
2008
121views more  JCM 2008»
13 years 5 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang