Sciweavers

CORR
2010
Springer
205views Education» more  CORR 2010»
13 years 9 months ago
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
—Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications. These networks have the pot...
Jaydip Sen, Kaustav Goswami
WINET
2008
94views more  WINET 2008»
13 years 10 months ago
Transmission costs, selfish nodes, and protocol design
We study how selfish nodes react to transmission costs in wireless networks. Intuitively, it seems that transmission costs should have a stabilizing effect as (rational) nodes will...
Peter Marbach
TISSEC
2008
100views more  TISSEC 2008»
13 years 10 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
CIIT
2007
195views Communications» more  CIIT 2007»
14 years 10 days ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
CIIT
2007
161views Communications» more  CIIT 2007»
14 years 10 days ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
MIDDLEWARE
2007
Springer
14 years 5 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
SRDS
2007
IEEE
14 years 5 months ago
Activity Monitoring to Guarantee File Availability in Structured P2P File-sharing Systems
A cooperative structured peer-to-peer file-sharing system requires that the nodes participating in the system need to maintain the location mappings of other nodes. However, the s...
Guowei Huang, Zhi Chen, Qi Zhao, Gongyi Wu
ICC
2007
IEEE
163views Communications» more  ICC 2007»
14 years 5 months ago
An Auction based AODV Protocol for Mobile Ad Hoc Networks with Selfish Nodes
– In this paper, we propose an auction mechanism for routing in mobile ad hoc networks with selfish nodes. Our approach is to promote bidding for end-to-end routes, as opposed to...
Cenker Demir, Cristina Comaniciu