Sciweavers

440 search results - page 62 / 88
» Path set selection in mobile ad hoc networks
Sort
View
INFOCOM
2008
IEEE
15 years 6 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
BROADNETS
2007
IEEE
15 years 6 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
TWC
2008
120views more  TWC 2008»
14 years 11 months ago
Reliable Multi-hop Routing with Cooperative Transmissions in Energy-Constrained Networks
We present a novel approach in characterizing the optimal reliable multi-hop virtual multiple-input single-output (vMISO) routing in ad hoc networks. Under a high node density regi...
Aylin Aksu, Özgür Erçetin
WOWMOM
2005
ACM
132views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
Comparisons of Inter-Domain Routing Schemes for Heterogeneous Ad Hoc Networks
— In this paper, we propose three interdomain routing schemes for communications between different ad-hoc groups (subnets), namely the implicit foreign degree based (IFD), the ex...
Wenbin Ma, Mooi Choo Chuah
CCS
2007
ACM
15 years 3 months ago
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach
Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish. In this paper, we propos...
Xiaoxin Wu, David K. Y. Yau