Sciweavers

261 search results - page 13 / 53
» Preventing selfish behavior in Ad Hoc networks
Sort
View
CSI
2008
113views more  CSI 2008»
14 years 11 months ago
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infra...
Klaus Plößl, Hannes Federrath
ADHOCNOW
2006
Springer
15 years 5 months ago
A Classification and Performance Comparison of Mobility Models for Ad Hoc Networks
In mobile ad hoc network research, simulation plays an important role in determining the network characteristics and measuring performance. On the other hand, unrealistic simulatio...
Emre Atsan, Öznur Özkasap
IFIP
2004
Springer
15 years 5 months ago
Activity-Based User Modeling in Service-Oriented Ad-Hoc-Networks
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly aï...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...
LCN
2008
IEEE
15 years 6 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
EJWCN
2010
156views more  EJWCN 2010»
14 years 6 months ago
On Performance Modeling of Ad Hoc Routing Protocols
Simulation studies have been the predominant method of evaluating ad hoc routing algorithms. Despite their wide use and merits, simulations are generally time consuming. Furthermo...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq