Sciweavers

671 search results - page 32 / 135
» Trust evaluation in ad-hoc networks
Sort
View
CORR
2008
Springer
127views Education» more  CORR 2008»
15 years 1 months ago
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of...
Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos...
ADHOC
2006
95views more  ADHOC 2006»
15 years 1 months ago
LHAP: A lightweight network access control protocol for ad hoc networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
131
Voted
TDSC
2010
157views more  TDSC 2010»
14 years 8 months ago
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures
Network survivability is the ability of a network keeping connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad...
Fei Xing, Wenye Wang
MOBIHOC
2002
ACM
16 years 1 months ago
Directional virtual carrier sensing for directional antennas in mobile ad hoc networks
This paper presents a new carrier sensing mechanism called DVCS (Directional Virtual Carrier Sensing) for wireless communication using directional antennas. DVCS does not require ...
Mineo Takai, Jay Martin, Rajive Bagrodia, Aifeng R...
CORR
2010
Springer
164views Education» more  CORR 2010»
15 years 1 months ago
Performance Comparison of Link, Node and Zone Disjoint Multi-path Routing Strategies and Minimum Hop Single Path Routing for Mob
The high-level contribution of this paper is a simulation-based analysis to evaluate the tradeoffs between lifetime and hop count of link-disjoint, node-disjoint and zone-disjoint...
Natarajan Meghanathan