Sciweavers

TDSC
2011
13 years 7 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
HIPC
2004
Springer
14 years 5 months ago
An Incentive Driven Lookup Protocol for Chord-Based Peer-to-Peer (P2P) Networks
In this paper we describe a novel strategy for carrying out lookups in Chord-based peer-to-peer (P2P) networks, wherein nodes are assumed to behave selfishly. This is in contrast ...
Rohit Gupta, Arun K. Somani
ICPADS
2006
IEEE
14 years 6 months ago
Incentive Compatible Cost- and Stability-Based Routing in Ad Hoc Networks
In this paper, we embed an incentive-compatible, efficient, and individual rational payment scheme into our cost- and stability-based routing protocol in ad hoc networks which co...
Mingming Lu, Feng Li, Jie Wu
MIDDLEWARE
2007
Springer
14 years 6 months ago
AVMEM - Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems
Monitoring and management operations that query nodes based on their availability can be extremely useful in a variety of largescale distributed systems containing hundreds to thou...
Ramsés Morales, Brian Cho, Indranil Gupta
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 6 months ago
A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE 802.11 DCF
— The CSMA/CA protocols are designed under the assumption that all participant nodes would abide to the protocol rules. This is of particular importance in distributed protocols ...
Alberto López Toledo, Xiaodong Wang
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 6 months ago
Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks
— In a mobile ad hoc network, node cooperation in packet forwarding is required for the network to function properly. However, since nodes in this network usually have limited re...
Tiranuch Anantvalee, Jie Wu