Sciweavers

261 search results - page 38 / 53
» Preventing selfish behavior in Ad Hoc networks
Sort
View
GLOBECOM
2007
IEEE
15 years 6 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
ADHOCNOW
2006
Springer
15 years 5 months ago
Evaluation of the Energy Consumption in MANET
In ad hoc mobile wireless networks, energy consumption is an important issue as most mobile hosts operate on limited battery resources. Existing models for evaluating the energy co...
Géraud Allard, Pascale Minet, Dang-Quan Ngu...
INFOCOM
2007
IEEE
15 years 6 months ago
Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks
—This paper presents a theoretic framework of optimal resource allocation and admission control for peer-topeer networks. Peer’s behavioral rankings are incorporated into the r...
Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer
COLCOM
2008
IEEE
15 years 6 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
JNW
2007
87views more  JNW 2007»
14 years 11 months ago
Modeling of IEEE 802.11 DCF for Transient State Conditions
—Performance of IEEE 802.11 distributed coordination function (DCF) has been studied by several authors under steady-state conditions. Behavior of DCF under transient state condi...
Rama Krishna Challa, Saswat Chakrabarti, Debasish ...