Sciweavers

459 search results - page 57 / 92
» A Reputation-Based Trust Mechanism for Ad Hoc Networks
Sort
View
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 4 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
GLOBECOM
2007
IEEE
15 years 4 months ago
A Busy-Tone Based MAC Scheme for Wireless Ad Hoc Networks Using Directional Antennas
— Applying directional antennas in wireless ad hoc networks offers numerous benefits, such as extended communication range, increased spatial reuse, improved capacity and suppre...
Hongning Dai, Kam-Wing Ng, Min-You Wu
ADHOCNOW
2005
Springer
15 years 3 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
IAAI
2003
14 years 11 months ago
Secure Mobile Agents on Ad Hoc Wireless Networks
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wirel...
Evan Sultanik, Donovan Artz, Gustave Anderson, Mos...
JSAC
2008
114views more  JSAC 2008»
14 years 9 months ago
Design of an Optimal Bayesian Incentive Compatible Broadcast Protocol for Ad Hoc Networks with Rational Nodes
Nodes in an ad hoc wireless network incur certain costs for forwarding packets since packet forwarding consumes the resources of the nodes. If the nodes are rational, free packet f...
N. Ram Suri, Y. Narahari