Sciweavers

123 search results - page 12 / 25
» Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
14 years 11 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
MONET
2002
128views more  MONET 2002»
14 years 9 months ago
MARE: Resource Discovery and Configuration in Ad Hoc Networks
The emergence of personal portable devices, such as PDA's and Mobile phones, with considerable processing and communication capabilities, has led to a desire to use various co...
Matt Storey, Gordon S. Blair, Adrian Friday
IJWIN
2002
111views more  IJWIN 2002»
14 years 9 months ago
Internet Connectivity for Ad Hoc Mobile Networks
The growing deployment rate of wireless LANs indicates that wireless networking is rapidly becoming a prevalent form of communication. As users become more accustomed to the use o...
Yuan Sun, Elizabeth M. Belding-Royer, Charles E. P...
AINTEC
2006
Springer
15 years 1 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 4 months ago
Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks
—Recently, game theory becomes a useful and powerful tool to research mobile ad hoc networks (MANETs). Wireless LANs (WLANs) can work under both infrastructure and ad hoc modes, ...
Liqiang Zhao, Jie Zhang, Kun Yang, Hailin Zhang