Sciweavers

91 search results - page 12 / 19
» On trust models and trust evaluation metrics for ad hoc netw...
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Evaluation of MIMO Techniques in FH-MA Ad Hoc Networks
—We consider an ad hoc network where frequency hopping (FH), convolutional coding and multiple antennas are employed in order to combat fading and multiple access (MA) interferen...
Kostas Stamatiou, John G. Proakis, James R. Zeidle...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ICWN
2004
13 years 9 months ago
A Comparison Study of Address Autoconfiguration Schemes for Mobile Ad Hoc Network
In this paper, we classified existing address autoconfiguration schemes based on two communication models: centralized and distributed schemes. We defined performance metrics and ...
Soyeon Ahn, Namhoon Kim, Woohyun Kim, Younghee Lee
WIMOB
2008
IEEE
14 years 2 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
ADHOC
2006
115views more  ADHOC 2006»
13 years 7 months ago
Routing characteristics of ad hoc networks with unidirectional links
Unidirectional links in an ad hoc network can result from factors such as heterogeneity of receiver and transmitter hardware, power control or topology control algorithms, or diff...
Jorjeta G. Jetcheva, David B. Johnson