Sciweavers

908 search results - page 167 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 3 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
72
Voted
SIGMETRICS
2008
ACM
14 years 9 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
ICNP
2003
IEEE
15 years 2 months ago
Mobile Distributed Information Retrieval for Highly-Partitioned Networks
We propose and evaluate a mobile, peer-to-peer Information Retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large colle...
Katrina M. Hanna, Brian Neil Levine, R. Manmatha
102
Voted
IWCMC
2006
ACM
15 years 3 months ago
Optimal hierarchical energy efficient design for MANETs
Due to the growing interest in mobile wireless Ad-Hoc networks’ (MANETs) applications, researchers have proposed many routing protocols that differ in their objective. Energy ef...
Wasim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuqa...
CORR
2007
Springer
92views Education» more  CORR 2007»
14 years 9 months ago
Throughput Scaling in Random Wireless Networks: A Non-Hierarchical Multipath Routing Strategy
— Franceschetti et al. [1] have recently shown that per-node throughput in an extended (i.e., geographically expanding), ad hoc wireless network with Θ(n) randomly distributed n...
Awlok Josan, Mingyan Liu, David L. Neuhoff, S. San...