Sciweavers

105 search results - page 7 / 21
» MUTON: Detecting Malicious Nodes in Disruption-Tolerant Netw...
Sort
View
JCIT
2010
131views more  JCIT 2010»
13 years 3 months ago
A Secure Routing Protocol for Peer-to-Peer Network
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
Xu Xiang, Jianguo Chen
WICON
2010
13 years 6 months ago
Toward Clock Skew based Wireless Sensor Node Services
Clock skew is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the tempera...
Md. Borhan Uddin, Claude Castelluccia
INFOCOM
2012
IEEE
11 years 11 months ago
On detecting pollution attacks in inter-session network coding
Abstract—Dealing with pollution attacks in inter-session network coding is challenging due to the fact that sources, in addition to intermediate nodes, can be malicious. In this ...
Anh Le, Athina Markopoulou
NETGAMES
2006
ACM
14 years 2 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 3 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi