Sciweavers

261 search results - page 14 / 53
» Preventing selfish behavior in Ad Hoc networks
Sort
View
MMNS
2003
130views Multimedia» more  MMNS 2003»
15 years 1 months ago
TCP Friendly Rate Adaptation for Multimedia Streaming in Mobile ad hoc Networks
Transport protocol for supporting multimedia streaming in mobile ad hoc networks has to cope with the rich dynamics, including mobility-induced disconnection, reconnection, and hig...
Zhenghua Fu, Xiaoqiao Meng, Songwu Lu
INFOCOM
2000
IEEE
15 years 4 months ago
Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the perf...
Samir Ranjan Das, Charles E. Perkins, Elizabeth M....
INFOCOM
2003
IEEE
15 years 5 months ago
On the Capacity of Hybrid Wireless Networks
— We study the throughput capacity of hybrid wireless networks. A hybrid network is formed by placing a sparse network of base stations in an ad hoc network. These base stations ...
Benyuan Liu, Zhen Liu, Donald F. Towsley
GLOBECOM
2008
IEEE
14 years 12 months ago
Secure Location Verification for Vehicular Ad-Hoc Networks
In this paper, we examine one of the security issues in vehicular ad-hoc network (VANETs): position-spoofing attack. We propose a novel Secure Location Verification (SLV) scheme to...
Joo-Han Song, Victor W. S. Wong, Vincent C. M. Leu...
ICDCSW
2003
IEEE
15 years 5 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...