Sciweavers

170 search results - page 6 / 34
» Using a two-timer scheme to detect selfish nodes in mobile a...
Sort
View
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 1 months ago
Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks
— In a mobile ad hoc network, node cooperation in packet forwarding is required for the network to function properly. However, since nodes in this network usually have limited re...
Tiranuch Anantvalee, Jie Wu
PEWASUN
2004
ACM
14 years 28 days ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 7 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
IWDC
2004
Springer
161views Communications» more  IWDC 2004»
14 years 26 days ago
Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model
Abstract. In ad hoc networks, node mobility causes the network topology to change dynamically over time, which complicates important tasks such as routing and flow control. We pro...
Zainab R. Zaidi, Brian L. Mark
ICC
2000
IEEE
376views Communications» more  ICC 2000»
13 years 12 months ago
TCP-Bus: Improving TCP Performance in Wireless Ad-Hoc Networks
Abstract: Reliable data transmission over wireless multi-hop networks, called ad hoc networks, has proven to be non-trivial. TCP (Transmission Control Protocol), a widely used end-...
Dongkyun Kim, Chai-Keong Toh, Yanghee Choi