Sciweavers

612 search results - page 30 / 123
» Engineering Incentive Schemes for Ad Hoc Networks
Sort
View
189
Voted
SECPERU
2006
IEEE
15 years 10 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
ICDCSW
2005
IEEE
15 years 9 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
MWCN
2004
Springer
15 years 9 months ago
Cluster-Based Location-Services for Scalable Ad Hoc Network Routing
: We propose a location-service to assist location-based routing protocols, realised through our Associativity-Based Clustering protocol. The main goal of our scheme, which employs...
Sivapathalingham Sivavakeesar, George Pavlou
149
Voted
WONS
2005
IEEE
15 years 9 months ago
Broadcasting in Hybrid Ad Hoc Networks
In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multi-hop cellular a...
François Ingelrest, David Simplot-Ryl, Ivan...
136
Voted
LCN
2008
IEEE
15 years 10 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong