Sciweavers

261 search results - page 12 / 53
» Preventing selfish behavior in Ad Hoc networks
Sort
View
SAC
2005
ACM
15 years 5 months ago
An adaptive TDMA slot assignment protocol in ad hoc sensor networks
Due to its ability to provide collision-free packet transmission regardless of the traffic load, TDMA (Time Division Multiple Access) has been applied in ad hoc sensor networks. W...
Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio
INFOCOM
2012
IEEE
13 years 2 months ago
Capacity of distributed content delivery in large-scale wireless ad hoc networks
—In most existing wireless networks, end users obtain data content from the wired network, typically, the Internet. In this manner, virtually all of their traffic must go throug...
Wang Liu, Kejie Lu, Jianping Wang, Yi Qian, Tao Zh...
ACSAC
2004
IEEE
15 years 3 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
Multi-path Admission Control for Mobile Ad hoc Networks
As wireless networks become more prevalent, users will demand the same applications that are currently available in wired networks. Further, they will expect to receive a quality ...
Anders Lindgren, Elizabeth M. Belding-Royer
DCOSS
2010
Springer
15 years 3 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos