Sciweavers

908 search results - page 106 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
GLOBECOM
2008
IEEE
15 years 6 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
NCA
2005
IEEE
15 years 5 months ago
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements
Context-aware applications rely on the ability to perceive the state of the surrounding environment. In this paper, we address a class of such applications where real-time guarant...
Malika Boulkenafed, Barbara Hughes, René Me...
ISCC
2005
IEEE
104views Communications» more  ISCC 2005»
15 years 5 months ago
Bandwidth Guaranteed Routing for Ad Hoc Networks with Interference Consideration
The problem of computing bandwidth guaranteed paths for given flow requests in an ad-hoc network is complicated because neighboring links share the medium. We define the path wi...
Zhanfeng Jia, Rajarshi Gupta, Jean C. Walrand, Pra...
EUROPAR
2008
Springer
15 years 1 months ago
Auction Protocols for Resource Allocations in Ad-Hoc Grids
Abstract. Different auction-based approaches have been used to allocate resources in Grids, but none of them provide the design choice for a specific economic model while consideri...
Behnaz Pourebrahimi, Koen Bertels
IWCMC
2009
ACM
15 years 6 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...