Sciweavers

106 search results - page 3 / 22
» Network Court Protocol and Malicious Node Conviction
Sort
View
ADHOCNOW
2003
Springer
14 years 20 days ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
CN
2010
83views more  CN 2010»
13 years 7 months ago
Secure peer sampling
PuppetCast is a protocol for secure peer sampling in large-scale distributed systems. A peer sampling protocol continuously provides each node in the system with a uniform random ...
Gian Paolo Jesi, Alberto Montresor, Maarten van St...
SASO
2007
IEEE
14 years 1 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen
SECON
2010
IEEE
13 years 5 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
AINTEC
2006
Springer
13 years 11 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha