Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
This paper explores the issues connected to the transmission of three dimensional scenes over unreliable networks such as the wireless ones. It analyzes the effect of the loss of ...
Pietro Zanuttigh, Andrea Zanella, Guido M. Cortela...
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
—This paper discusses wireless mesh network topology visualization tools and their requirements. It presents an interactive tool for visualizing mesh network topologies. The prop...
Mobile IPv6 (MIPv6) protocol is a new protocol designed to support the node mobility ofIPv6 protocol, which is a basic protocol of the next generation Internet. Protocol testing c...