Tcl and the Tk toolkit
MACAW: a media access protocol for wireless LAN's
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A distance routing effect algorithm for mobility (DREAM)
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Security protocol for IEEE 802.11 wireless local area network
Mobile Networks and Applications - Special issue on wireless LANs
Unidirectional links prove costly in wireless ad hoc networks
DIALM '99 Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications
Query localization techniques for on-demand routing protocols in ad hoc networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Scenario-based performance analysis of routing protocols for mobile ad-hoc networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Associativity-Based Routing for Ad Hoc Mobile Networks
Wireless Personal Communications: An International Journal
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Geocasting in Mobile Ad Hoc Networks: Location-Based Multicast Algorithms
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Source-Tree Routing in Wireless Networks
ICNP '99 Proceedings of the Seventh Annual International Conference on Network Protocols
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
IEEE 802.11 Wireless Local Area Networks
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
SCG '01 Proceedings of the seventeenth annual symposium on Computational geometry
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Efficient tracing of failed nodes in sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
SPINS: security protocols for sensor networks
Wireless Networks
Denial of Service in Sensor Networks
Computer
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Secure traceroute to detect faulty or malicious routing
ACM SIGCOMM Computer Communication Review
Smooth kinetic maintenance of clusters
Proceedings of the nineteenth annual symposium on Computational geometry
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Strategies for enhancing routing security in protocols for mobile ad hoc networks
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Securing Mobile Ad hoc Networks — A Motivational Approach
BT Technology Journal
Proceedings of the 9th annual international conference on Mobile computing and networking
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Alert aggregation in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Proceedings of the 1st international conference on Embedded networked sensor systems
About the impact of co-operation approaches for Ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Cooperation Issues in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Towards a new paradigm for securing wireless sensor networks
Proceedings of the 2003 workshop on New security paradigms
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Quality of service in mobile ad hoc networks
The handbook of ad hoc wireless networks
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Electric-field-based routing: a reliable framework for routing in MANETs
ACM SIGMOBILE Mobile Computing and Communications Review
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
Experiences applying game theory to system design
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Rethinking incentives for mobile ad hoc networks
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Peer-to-Peer Security in Mobile Devices: A User Perspective
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
Proceedings of the 3rd ACM workshop on Wireless security
Mobility-based anomaly detection in cellular mobile networks
Proceedings of the 3rd ACM workshop on Wireless security
Fault management in event-driven wireless sensor networks
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Truthful multicast routing in selfish wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
An advanced signature system for OLSR
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Sinkhole Intrusion Indicators in DSR MANETs
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
On Optimal Placement of Intrusion Detection Modules in Sensor Networks
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Information Assurance In Wireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
A Game-Theoretic Analysis on the Conditions of Cooperation in a Wireless Ad Hoc Network
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Hidden-action in multi-hop routing
Proceedings of the 6th ACM conference on Electronic commerce
Improving TCP performance over wireless networks with collaborative multi-homed mobile hosts
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Smooth kinetic maintenance of clusters
Computational Geometry: Theory and Applications - Special issue on the 19th annual symposium on computational geometry - SoCG 2003
A framework for MAC protocol misbehavior detection in wireless networks
Proceedings of the 4th ACM workshop on Wireless security
Hotspot-based traceback for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
Proceedings of the 11th annual international conference on Mobile computing and networking
MoB: a mobile bazaar for wide-area wireless services
Proceedings of the 11th annual international conference on Mobile computing and networking
Dependable Dynamic Source Routing without a trusted third party
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Certain limitations of reputation--based schemes in mobile environments
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Allowing multi-hops in cellular networks: an economic analysis
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
A novel secure wireless video surveillance system based on Intel IXP425 network processor
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
Experimental comparisons between SAODV and AODV routing protocols
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
On the resiliency of mobile ad hoc networks to MAC layer misbehavior
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks
IEEE Internet Computing
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
Cooperation in wireless ad hoc networks: a market-based approach
IEEE/ACM Transactions on Networking (TON)
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Proceedings of the 4th international conference on Mobile systems, applications and services
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Cooperation in ad hoc networks: enhancing the virtual currency based models
InterSense '06 Proceedings of the first international conference on Integrated internet ad hoc and sensor networks
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Cooperation monitoring issues in ad hoc networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
ICAM: Integrated Cellular and Ad Hoc Multicast
IEEE Transactions on Mobile Computing
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
rDCF: A Relay-Enabled Medium Access Control Protocol for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
DOA: DSR over AODV Routing for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Incentive mechanism design for selfish hybrid wireless relay networks
Mobile Networks and Applications
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Distributed fault detection of wireless sensor networks
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Improved security in geographic ad hoc routing through autonomous position verification
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Troubleshooting wireless mesh networks
ACM SIGCOMM Computer Communication Review
Evolution of cooperation in ad hoc networks under game theoretic model
Proceedings of the 4th ACM international workshop on Mobility management and wireless access
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
IEEE Transactions on Mobile Computing
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Achieving cooperation in multihop wireless networks of selfish nodes
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Modeling energy constrained routing in selfish ad hoc networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
A price-based reliable routing game in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Inner-Circle Consistency for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Fair Coalitions for Power-Aware Routing in Wireless Networks
IEEE Transactions on Mobile Computing
Dynamic quorum policy for maximizing throughput in limited information multiparty MAC
IEEE/ACM Transactions on Networking (TON)
Resilience of sink filtering scheme in wireless sensor networks
Computer Communications
A secure alternate path routing in sensor networks
Computer Communications
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
Computer Communications
COMBINE: leveraging the power of wireless peers through collaborative downloading
Proceedings of the 5th international conference on Mobile systems, applications and services
Sustaining cooperation in multi-hop wireless networks
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Backbone construction in selfish wireless networks
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Aggregating Bandwidth for Multihomed Mobile Collaborative Communities
IEEE Transactions on Mobile Computing
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
SecLEACH-On the security of clustered sensor networks
Signal Processing
Integrating a trust framework with a distributed certificate validation scheme for MANETs
EURASIP Journal on Wireless Communications and Networking
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks
Computer Communications
Cooperation Enhancement for Message Transmission in VANETs
Wireless Personal Communications: An International Journal
Free riding-aware forwarding in Content-Addressable Networks
The VLDB Journal — The International Journal on Very Large Data Bases
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
On improving the efficiency of truthful routing in MANETs with selfish nodes
Pervasive and Mobile Computing
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
A mobile bazaar for wide-area wireless services
Wireless Networks
Stimulating cooperation in route discovery of ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
PRISM: Improving the Performance of Inverse-Multiplexed TCP in Wireless Networks
IEEE Transactions on Mobile Computing
Interactive wormhole detection and evaluation
Information Visualization
Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network
Computer Communications
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
A game-theoretic intrusion detection model for mobile ad hoc networks
Computer Communications
Advanced Engineering Informatics
Enabling a cooperative strategy in mobile ad-hoc networks
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
Secure routing protocol for mobile ad-hoc networks
Proceedings of the 2007 Summer Computer Simulation Conference
The performance of a watchdog protocol for wireless network security
International Journal of Wireless and Mobile Computing
International Journal of Security and Networks
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Reliable data delivery in wireless sensor networks using distributed cluster monitoring
International Journal of Sensor Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
How to avoid packet droppers with proactive routing protocols for ad hoc networks
International Journal of Network Management
Autonomic trust reasoning enables misbehavior detection in OLSR
Proceedings of the 2008 ACM symposium on Applied computing
A novel approach for creating trust to reduce malicious behavior in MANET
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Modified AODV protocol for prevention of denial of service attacks in wireless ad hoc networks
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
Secure sensor network routing: a clean-slate approach
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Truthful multipath routing for ad hoc networks with selfish nodes
Journal of Parallel and Distributed Computing
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
Hidden information and actions in multi-hop wireless ad hoc networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Self-monitoring for sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Cooperative packet relaying model for wireless ad hoc networks
Proceedings of the 1st ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing
Une approche robuste pour la prolongation de la durée de vie des réseaux ad hoc multimédias
UbiMob '08 Proceedings of the 4th French-speaking conference on Mobility and ubiquity computing
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
ACM Transactions on Information and System Security (TISSEC)
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
ACM Transactions on Sensor Networks (TOSN)
Attack distribution modeling and its applications in sensor network security
EURASIP Journal on Wireless Communications and Networking
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
Trust-based evolutionary game model assisting AODV routing against selfishness
Journal of Network and Computer Applications
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Incentive-compatible opportunistic routing for wireless networks
Proceedings of the 14th ACM international conference on Mobile computing and networking
MMAN - a monitor for mobile ad hoc networks: design, implementation, and experimental evaluation
Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Monitoring assisted robust routing in wireless mesh networks
Mobile Networks and Applications
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network
Computational Intelligence and Security
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
Network Forensics on Mobile Ad-Hoc Networks
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III
A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
A Novel Approach for Security and Robustness in Wireless Embedded Systems
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
Cybernetics and Systems
LIDF: Layered intrusion detection framework for ad-hoc networks
Ad Hoc Networks
Impact of denial of service attacks on ad hoc networks
IEEE/ACM Transactions on Networking (TON)
An approach for promoting contribution in GAF-based ad hoc networks: design and implementation
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
TSR: trust-based secure MANET routing using HMMs
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Using context information to evaluate cooperativeness
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Improving the reliability of ad-hoc on demand distance vector protocol
WSEAS TRANSACTIONS on COMMUNICATIONS
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A cross-layer dropping attack in video streaming over ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
Routing game in hybrid wireless mesh networks with selfish mesh clients
International Journal of Autonomous and Adaptive Communications Systems
Optimal forwarding for wireless ad hoc networks with game theory
International Journal of Autonomous and Adaptive Communications Systems
Games to induce specified equilibria
Theoretical Computer Science
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part I on On the Move to Meaningful Internet Systems:
A Fault-Tolerant Event Boundary Detection Algorithm in Sensor Networks
Information Networking. Towards Ubiquitous Networking and Services
Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks
Information Networking. Towards Ubiquitous Networking and Services
Fuzzy Logic Based Reputation System for Mobile Ad Hoc Networks
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
An attacker model for MANET routing security
Proceedings of the second ACM conference on Wireless network security
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
Proceedings of the second ACM conference on Wireless network security
Proceedings of the second ACM conference on Wireless network security
Scrivener: providing incentives in cooperative content distribution systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
A middleware service for mobile ad hoc data sharing, enhancing data availability
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
Reporter node determination of replicated node detection in wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A light-weight scalable truthful routing protocol in MANETs with selfish nodes
International Journal of Ad Hoc and Ubiquitous Computing
On eliminating packet droppers in MANET: A modular solution
Ad Hoc Networks
A key management protocol with robust continuity for sensor networks
Computer Standards & Interfaces
OMH: suppressing selfish behavior in ad hoc networks with One More Hop
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Distributed resource allocation algorithms for peer-to-peer networks
Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
Proceedings of the 4th Annual International Conference on Wireless Internet
Distributed data source verification in wireless sensor networks
Information Fusion
Game theoretic packet relaying model for wireless ad hoc networks
International Journal of Communication Networks and Distributed Systems
Path-Based Reputation System for MANET Routing
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
A trust model based on fuzzy recommendation for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multimodal security enforcement framework for wireless ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Secure network coding for wireless mesh networks: Threats, challenges, and directions
Computer Communications
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
International Journal of Security and Networks
Secure many to many routing for wireless sensor and actuator networks
Proceedings of the 2nd international conference on Security of information and networks
Mitigating routing vulnerabilities in ad hoc networks using reputations
International Journal of Information and Computer Security
Design and simulation on data-forwarding security in sensor networks
International Journal of Information and Computer Security
An authentication scheme for locating compromised sensor nodes in WSNs
Journal of Network and Computer Applications
Securing wireless mesh networks: a winning combination of routing and forwarding mechanisms
Proceedings of the 5th International Latin American Networking Conference
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
A framework for detecting selfish misbehavior in wireless mesh community networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
FIND: faulty node detection for wireless sensor networks
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
Proceedings of the 2009 International Conference on Hybrid Information Technology
Smooth kinetic maintenance of clusters
Computational Geometry: Theory and Applications - Special issue on the 19th annual symposium on computational geometry - SoCG 2003
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Computer Communications
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Location-based incentive pricing for tree-based relaying in multi-hop cellular networks
Computer Communications
IEEE Transactions on Communications
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
DoS detection in cluster-based sensor networks
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Bargain-based stimulation mechanism for selfish mobile nodes in participatory sensing network
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
COFFEE: a context-free protocol for stimulating data forwarding in wireless ad hoc networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Catching packet droppers and modifiers in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Cooperation in ad hoc networks with noisy channels
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Impact of a simple load balancing approach and an incentive-based scheme on MANET performance
Journal of Parallel and Distributed Computing
MeshMan: a management framework for wireless mesh networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Association between nodes to combat blackhole attack in DSR based MANET
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
Critical issues in trust management for mobile ad-hoc networks
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
An Architecture for Dynamic Trust Monitoring in Mobile Networks
OTM '09 Proceedings of the Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009
Incentives for P2P file sharing in mobile ad hoc networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
An algebraic watchdog for wireless network coding
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
A global security architecture for operated hybrid WLAN mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A dynamic intrusion detection hierarchy for MANETs
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Court trial based detection of forwarding misbehaviors in wireless networks
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs)
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
OMH--Suppressing Selfish Behavior in Ad hoc Networks with One More Hop
Mobile Networks and Applications
Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Survey of attacks on AODV and MAODV
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Promoting cooperation among strangers to access Internet services from an ad hoc network
Pervasive and Mobile Computing
REDMAN: An optimistic replication middleware for read-only resources in dense MANETs
Pervasive and Mobile Computing
Security enforcement in wireless sensor networks: A framework based on non-cooperative games
Pervasive and Mobile Computing
A hotspot-based protocol for attack traceback in mobile ad hoc networks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Lightweight anomaly intrusion detection in wireless sensor networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
On the resilient overlay topology formation in multi-hop wireless networks
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure location service for ad hoc position-based routing using self-signed locations
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Reputation-based routing in hybrid ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A trust approach for node cooperation in MANET
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Misbehaviors detection to ensure availability in OLSR
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
Analysis of distributed packet forwarding trategies in ad hoc networks
PPAM'07 Proceedings of the 7th international conference on Parallel processing and applied mathematics
SCUBA: focus and context for real-time mesh network health diagnosis
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Resilience to dropping nodes in mobile ad hoc networks with link-state routing
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
On the endogenous formation of energy efficient cooperative wireless networks
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Security analysis of TORA routing protocol
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
An intelligent agent for fault reconnaissance in sensor networks
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
MPC: mitigating stealthy power control attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Generalized second price auction in multi-path routing with selfish nodes
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Cooperative strategy by Stackelberg games under energy constraint in multi-hop relay networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Channel-aware detection of gray hole attacks in wireless mesh networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Comparison of access control methods in mobile as-hoc networks
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
PROTECT: proximity-based trust-advisor using encounters for mobile societies
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A new mechanism to detect selfish behavior in IEEE 802.11 ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Game-theoretic approach for improving cooperation in wireless multihop networks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Attack and flee: game-theory-based analysis on interactions among nodes in MANETs
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Pi: a practical incentive protocol for delay tolerant networks
IEEE Transactions on Wireless Communications
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
IEEE Transactions on Wireless Communications
Providing witness anonymity under peer-to-peer settings
IEEE Transactions on Information Forensics and Security
Bandwidth exchange: an energy conserving incentive mechanism for cooperation
IEEE Transactions on Wireless Communications
Hybrid trust and reputation management for sensor networks
Wireless Networks
The controversy of selfish nodes in ad hoc networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Stimulating cooperation in multi-hop wireless networks using cheating detection system
INFOCOM'10 Proceedings of the 29th conference on Information communications
From time domain to space domain: detecting replica attacks in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
INPAC: an enforceable incentive scheme for wireless networks using network coding
INFOCOM'10 Proceedings of the 29th conference on Information communications
INFOCOM'10 Proceedings of the 29th conference on Information communications
A formal study of trust-based routing in wireless ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Neighborhood monitoring in ad hoc networks
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Rating the raters: a reputation system for wiki-like domains
Proceedings of the 3rd international conference on Security of information and networks
International Journal of Communication Networks and Distributed Systems
Quantifying resiliency and detection latency of intrusion detection structures
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
SReD: a secure reputation-based dynamic window scheme for disruption-tolerant networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Trust based security in MANET routing protocols: a survey
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
An efficient reputation-based mechanism to enforce cooperation in MANETs
CIT'10 Proceedings of the 4th international conference on Communications and information technology
A gradual solution to detect selfish nodes in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Real-time detection of traffic anomalies in wireless mesh networks
Wireless Networks
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
Probabilistic packet relaying in wireless mobile ad hoc networks
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I
The design of a reliable reputation system
Electronic Commerce Research
Fault reconnaissance agent for sensor networks
Mobile Information Systems
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks
IEEE Transactions on Wireless Communications
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Creating and maintaining a good intrusion detection hierarchy in dynamic ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Secure neighborhood routing protocol
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A cross-layer approach to detect jamming attacks in wireless ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Understanding dynamic denial of service attacks in mobile ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Comparison of two intrusion detection schemes for sparsely connected ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Fault-models in wireless communication: towards survivable ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Protocols for stimulating packet forwarding in wireless ad hoc networks
IEEE Wireless Communications
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
A cross-layer reliability metric for wireless mesh networks with selfish participants
ACM SIGMOBILE Mobile Computing and Communications Review
Efficient certification path discovery for MANET
EURASIP Journal on Wireless Communications and Networking
COSR: a reputation-based secure route protocol in MANET
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
Computer Communications
A reputation system for wireless mesh networks using network coding
Journal of Network and Computer Applications
Vehicular networks and the future of the mobile internet
Computer Networks: The International Journal of Computer and Telecommunications Networking
A lightweight group-key management protocol for secure ad-hoc-network routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Future Generation Computer Systems
Cautious rating for trust-enabled routing in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Perspectives of selfish behaviour in mobile ad hoc networks
NMA'10 Proceedings of the 7th international conference on Numerical methods and applications
Eliminating misbehaving nodes by opinion based trust evaluation model in MANETs
Proceedings of the 2011 International Conference on Communication, Computing & Security
Black-hole attacks in P2P mobile networks discovered through Bayesian filters
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems
Secure routing in ad hoc networks and a related intrusion detection problem
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
On supporting distributed collaboration in sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Detecting misbehaving nodes in MANETs
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Priming: making the reaction to intrusion or fault predictable
Natural Computing: an international journal
Misbehaving nodes detection through opinion based trust evaluation model in MANETs
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Journal of Network and Computer Applications
A combinational perspective in stimulating cooperation in mobile ad hoc networks
Journal of Computer Science and Technology
ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
Secured routing over MANET with power management
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
GRAP: Grey risk assessment based on projection in ad hoc networks
Journal of Parallel and Distributed Computing
Simulations, models, and testbeds: A mutual catalysis
Performance Evaluation
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Game theoretic approach in routing protocol for cooperative wireless sensor networks
ICSI'11 Proceedings of the Second international conference on Advances in swarm intelligence - Volume Part II
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Bullet-proof verification (BPV) method to detect black hole attack in mobile ad hoc networks
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Trust-based minimum cost opportunistic routing for Ad hoc networks
Journal of Systems and Software
Wireless Personal Communications: An International Journal
Short paper: can your phone trust your friend selection?
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Security in wireless sensor networks: key intrusion detection module in SOOAWSN
Proceedings of the 14th Communications and Networking Symposium
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks
Proceedings of the 4th international conference on Security of information and networks
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
A wireless intrusion detection system for secure clustering and routing in ad hoc networks
ISC'06 Proceedings of the 9th international conference on Information Security
Proactive resilience to dropping nodes in mobile ad hoc networks
AINTEC'06 Proceedings of the Second Asian international conference on Technologies for Advanced Heterogeneous Networks
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
Mechanisms to induce random choice
WINE'06 Proceedings of the Second international conference on Internet and Network Economics
Distributed self-policing architecture for fostering node cooperation in wireless mesh networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
On the anomaly intrusion-detection in mobile ad hoc network environments
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
EG-ICE'06 Proceedings of the 13th international conference on Intelligent Computing in Engineering and Architecture
Detecting disruptive routers in wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Reputation based localized access control for mobile ad-hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Self-monitoring security in ad hoc routing
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
LSTOP: a light-weight scalable truthful routing protocol in MANETs with selfish nodes
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Secure data transmission on multiple paths in mobile ad hoc networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Compact stimulation mechanism for routing discovery protocols in civilian ad-hoc networks
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
Zone-Based clustering for intrusion detection architecture in ad-hoc networks
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
Locating compromised sensor nodes through incremental hashing authentication
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Towards cheat-proof cooperative relay for cognitive radio networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Improving IP address autoconfiguration security in MANETs using trust modelling
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Cluster-Based certificate chain for mobile ad hoc networks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Cross-layer approach to detect data packet droppers in mobile ad-hoc networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
A specification-based intrusion detection model for OLSR
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Service allocation in selfish mobile ad hoc networks using vickrey auction
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Engineering incentive schemes for ad hoc networks
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
RIDA: robust intrusion detection in ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Robust routing in malicious environment for ad hoc networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Linking ad hoc charging schemes to AAAC architectures
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Security for interactions in pervasive networks: applicability of recommendation systems
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
Journal of Network and Computer Applications
Random feedbacks for selfish nodes detection in mobile ad hoc networks
IPOM'05 Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks
Network access control for mobile ad-hoc networks
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
A novel acknowledgment-based approach against collude attacks in MANET
Expert Systems with Applications: An International Journal
A new efficient fast routing protocol for MANET
AIC'10/BEBI'10 Proceedings of the 10th WSEAS international conference on applied informatics and communications, and 3rd WSEAS international conference on Biomedical electronics and biomedical informatics
An efficient scheme for detecting malicious nodes in mobile ad hoc networks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Dynamics of learning algorithms for the on-demand secure byzantine routing protocol
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
MoteAODV – an AODV implementation for TinyOS 2.0
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
A new visual simulation tool for performance evaluation of MANET routing protocols
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part II
A game theory-based surveillance mechanism against suspicious insiders in MANETs
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Scrivener: providing incentives in cooperative content distribution systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Trust management issues for ad hoc and self-organized networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Multipath routing protocols for mobile ad hoc networks: security issues and performance evaluation
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
FRI-attack: fraduelent routing information attack on wireless mesh network
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Entropy attacks and countermeasures in wireless network coding
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Solving soft security problem in MANETs using an evolutionary approach
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Packet forwarding strategies for cooperation enforcement in mobile ad hoc wireless networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
International Journal of Network Management
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
Charging support for ad hoc stub networks
Computer Communications
A novel misbehavior evaluation with dempster-shafer theory in wireless sensor networks
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
ViSim: A user-friendly graphical simulation tool for performance analysis of MANET routing protocols
Mathematical and Computer Modelling: An International Journal
Security Through Collaboration and Trust in MANETs
Mobile Networks and Applications
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Evolutionary reputation model for node selfishness resistance in opportunistic networks
Concurrency and Computation: Practice & Experience
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cooperative game-based routing approach for wireless sensor network
International Journal of Computer Applications in Technology
How do we encourage an egoist to act socially in an ad hoc mobile network?
Computer Networks: The International Journal of Computer and Telecommunications Networking
A strategic reputation-based mechanism for mobile ad hoc networks
Canadian AI'12 Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence
An incentive scheme in wireless access networks through a game based on trust prediction
International Journal of Ad Hoc and Ubiquitous Computing
Secure routing in MANETs using local times
Wireless Networks
Evaluation of collaborative selfish node detection in MANETS and DTNs
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
A fuzzy based trustworthy route selection method using LSRP in wireless sensor networks (FTRSP)
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
An incentive-based forwarding protocol for mobile ad hoc networks with anonymous packets
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
AK-PPM: an authenticated packet attribution scheme for mobile ad hoc networks
RAID'12 Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses
ICA3PP'12 Proceedings of the 12th international conference on Algorithms and Architectures for Parallel Processing - Volume Part II
Packet-level attestation (PLA): A framework for in-network sensor data reliability
ACM Transactions on Sensor Networks (TOSN)
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
Inspired Social Spider Behavior for Secure Wireless Sensor Networks
International Journal of Mobile Computing and Multimedia Communications
Analysing the development of cooperation in MANETs using evolutionary game theory
The Journal of Supercomputing
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
Mitigating collaborative blackhole attacks on DSR-Based mobile ad hoc networks
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
AODV-based technique for quick and secure local recovery from link failures in MANETs
International Journal of Communication Networks and Distributed Systems
Secure scheme against data dropping
Proceedings of the 16th Communications & Networking Symposium
Hash chains to secure proactive protocols
Proceedings of the 16th Communications & Networking Symposium
Requirements and design for neutral trust management framework in unstructured networks
The Journal of Supercomputing
Cross-layer metrics for reliable routing in wireless mesh networks
IEEE/ACM Transactions on Networking (TON)
On the credit evolution of credit-based incentive protocols in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A collaborative routing protocol against routing disruptions in MANETs
Personal and Ubiquitous Computing
Secure and robust multipath routings for advanced metering infrastructure
The Journal of Supercomputing
Algorithms for a distributed IDS in MANETs
Journal of Computer and System Sciences
The Impact of Cooperative Nodes on the Performance of Vehicular Delay-Tolerant Networks
Mobile Networks and Applications
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs
Wireless Personal Communications: An International Journal
A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles
Computer Communications
Wireless Personal Communications: An International Journal
A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks
Computers and Electrical Engineering
Hi-index | 0.01 |
This paper describes two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this problem, we propose categorizing nodes based upon their dynamically measured behavior. We use a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes. Through simulation we evaluate watchdog and pathrater using packet throughput, percentage of overhead (routing) transmissions, and the accuracy of misbehaving node detection. When used together in a network with moderate mobility, the two techniques increase throughput by 17% in the presence of 40% misbehaving nodes, while increasing the percentage of overhead transmissions from the standard routing protocol's 9% to 17%. During extreme mobility, watchdog and pathrater can increase network throughput by 27%, while increasing the overhead transmissions from the standard routing protocol's 12% to 24%.