The publish/subscribe model of communication provides sender/receiver decoupling and selective information dissemination that is appropriate for mobile environments characterized ...
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
— In this paper, we develop, analyze and implement a congestion control scheme obtained in a noncooperative game framework where each user’s cost function is composed of a pric...
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...