Sciweavers

908 search results - page 116 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
WICOMM
2008
139views more  WICOMM 2008»
14 years 11 months ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 12 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
EURONGI
2004
Springer
15 years 5 months ago
A Reservation Scheme Satisfying Bandwidth QoS Constraints for Ad-Hoc Networks
Achieving QoS (Quality of Service) in Mobile Ad-hoc NETworks (MANET) has been a research topic in the last years. In this paper we describe a QoS reservation mechanism for Routing ...
Llorenç Cerdà, Michael Voorhaen, Raf...
ADHOC
2010
126views more  ADHOC 2010»
14 years 12 months ago
Stable energy-aware topology management in ad hoc networks
Abstract-- The efficiency of a communication network depends not only on its control protocols, but also on the underlying network topology. We propose a distributed topology manag...
Lichun Bao, J. J. Garcia-Luna-Aceves
JSAC
2006
181views more  JSAC 2006»
14 years 11 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu