Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
In ad hoc mobile wireless networks, energy consumption is an important issue as most mobile hosts operate on limited battery resources. Existing models for evaluating the energy co...
—This paper presents a theoretic framework of optimal resource allocation and admission control for peer-topeer networks. Peer’s behavioral rankings are incorporated into the r...
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
—Performance of IEEE 802.11 distributed coordination function (DCF) has been studied by several authors under steady-state conditions. Behavior of DCF under transient state condi...