Sciweavers

877 search results - page 134 / 176
» Simulation-based performance evaluation of routing protocols...
Sort
View
BROADNETS
2007
IEEE
14 years 3 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
PERCOM
2009
ACM
14 years 9 months ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura
PAKDD
2007
ACM
238views Data Mining» more  PAKDD 2007»
14 years 3 months ago
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks
A mobile node in ad hoc networks may move arbitrarily and acts as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. Th...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Shun C...
WISTP
2010
Springer
14 years 4 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
GISCIENCE
2004
Springer
110views GIS» more  GISCIENCE 2004»
14 years 2 months ago
Information Dissemination in Mobile Ad-Hoc Geosensor Networks
This paper addresses the issue of how to disseminate relevant information to mobile agents within a geosensor network. Conventional mobile and location-aware systems are founded on...
Silvia Nittel, Matt Duckham, Lars Kulik