Sciweavers

106 search results - page 8 / 22
» Network Court Protocol and Malicious Node Conviction
Sort
View
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 7 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
ADHOC
2006
95views more  ADHOC 2006»
13 years 7 months ago
LHAP: A lightweight network access control protocol for ad hoc networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
IJNSEC
2007
171views more  IJNSEC 2007»
13 years 7 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
CNSR
2004
IEEE
13 years 11 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
WIOPT
2010
IEEE
13 years 5 months ago
Optimal revocations in ephemeral networks: A game-theoretic framework
—Revocation of public-key certificates is an important security primitive. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networ...
Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim ...