Sciweavers

288 search results - page 18 / 58
» Query-Based Model Checking of Ad Hoc Network Protocols
Sort
View
JNW
2006
149views more  JNW 2006»
13 years 8 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
JSAC
2006
111views more  JSAC 2006»
13 years 8 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
ICN
2007
Springer
14 years 2 months ago
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals
—Using Mobile Ad Hoc Networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal...
Bartosz Wietrzyk, Milena Radenkovic
JNW
2006
82views more  JNW 2006»
13 years 8 months ago
Mobility Modeling in Mobile Ad Hoc Networks with Environment-Aware
Simulation is the most important and widely used method in the research of Mobile Ad hoc NETworks (MANET). The topology of MANET and the mobility of mobile nodes are the key factor...
Gang Lu, Gordon A. Manson, Demetrios Belis
JOIN
2006
113views more  JOIN 2006»
13 years 8 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...