-
1
-
-
84866985446
-
Securing the OLSR protocol
-
C. Adjih, T.H. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, D. Raffo. Securing the OLSR protocol, in: Proc. of the 2nd IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2003, pp. 1-10.
-
(2003)
Proc. of the 2nd IFIP Annual Mediterranean Ad Hoc Networking Workshop
, pp. 1-10
-
-
Adjih, C.1
Clausen, T.H.2
Jacquet, P.3
Laouiti, A.4
Muhlethaler, P.5
Raffo, D.6
-
2
-
-
48049107779
-
-
INRIA
-
C. Adjih, T.H. Clausen, A. Laouiti, P. Muhlethaler, D. Raffo. Securing the OLSR Routing Protocol with or without Compromised Nodes in the Network. Technical Report RR-5494, INRIA, 2005.
-
(2005)
Securing the OLSR Routing Protocol with or Without Compromised Nodes in the Network. Technical Report RR-5494
-
-
Adjih, C.1
Clausen, T.H.2
Laouiti, A.3
Muhlethaler, P.4
Raffo, D.5
-
3
-
-
72849114321
-
Validation of the OLSR Routing Table based on Trust Reasoning
-
A. Adnane, C. Bidan, R.T. de Sousa, Jr. Validation of the OLSR Routing Table based on Trust Reasoning, in: Proc. of the International Workshop on Trust in Mobile Environments, 2008, pp. 1-12.
-
(2008)
Proc. of the International Workshop on Trust in Mobile Environments
, pp. 1-12
-
-
Adnane, A.1
Bidan, C.2
De Sousa Jr., R.T.3
-
4
-
-
56749097295
-
Autonomic Trust Reasoning Enables Misbehavior Detection in OLSR
-
A. Adnane, R.T. de Sousa Jr., C. Bidan, L. Mé. Autonomic Trust Reasoning Enables Misbehavior Detection in OLSR. In Proc. of ACM Symposium on Applied Computing, 2008, pp. 2006-2013.
-
(2008)
Proc. of ACM Symposium on Applied Computing
, pp. 2006-2013
-
-
Adnane, A.1
De Sousa Jr., R.T.2
Bidan, C.3
Mé., L.4
-
7
-
-
70349326431
-
Csr: Constrained selfish routing in ad-hoc networks
-
B. Liu, A. Bestavros, D.-Z. Du, J. Wang, Lecture Notes in Computer Science Springer Berlin/Heidelberg
-
C. Bassem, and A. Bestavros Csr: Constrained selfish routing in ad-hoc networks B. Liu, A. Bestavros, D.-Z. Du, J. Wang, Wireless Algorithms, Systems, and Applications Lecture Notes in Computer Science vol. 5682 2009 Springer Berlin/Heidelberg 179 189
-
(2009)
Wireless Algorithms, Systems, and Applications
, vol.5682
, pp. 179-189
-
-
Bassem, C.1
Bestavros, A.2
-
8
-
-
47249155248
-
Energy power-aware routing in OLSR protocol
-
A. Benslimane, R.E. Khoury, R.E. Azouzi, S. Pierre. Energy power-aware routing in OLSR protocol, in: Proc. of the 1st Mobile Computing and Wireless Communication International Conference (MCWC), 2006, pp. 14-19.
-
(2006)
Proc. of the 1st Mobile Computing and Wireless Communication International Conference (MCWC)
, pp. 14-19
-
-
Benslimane, A.1
Khoury, R.E.2
Azouzi, R.E.3
Pierre, S.4
-
11
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
DOI 10.1002/wcm.72
-
T. Camp, J. Boleng, and V. Davies A survey of mobility models for ad hoc network research Wireless Communications and Mobile Computing 2 2002 483 502 (Pubitemid 135713186)
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
12
-
-
51149111666
-
A scalable adaptation of the OLSR protocol for large clustered mobile ad hoc networks
-
L. Canourgues, J. Lephayand, L. Soyer, A.-L. Beylot. A scalable adaptation of the OLSR protocol for large clustered mobile ad hoc networks, in: Proc. of the 7th IFIP Annual Mediterranean Ad Hoc Networking Conference, 2008, pp. 97-108.
-
(2008)
Proc. of the 7th IFIP Annual Mediterranean Ad Hoc Networking Conference
, pp. 97-108
-
-
Canourgues, L.1
Lephayand, J.2
Soyer, L.3
Beylot, A.-L.4
-
13
-
-
72849125172
-
SC-OLSR: Secure clustering-based OLSR model for ad hoc networks
-
A. Chriqi, H. Otrok, J.-M. Robert, SC-OLSR: secure clustering-based OLSR model for ad hoc networks, in: Proc. of the 5th IEEE WiMob, 2009, pp. 239 - 245.
-
(2009)
Proc. of the 5th IEEE WiMob
, pp. 239-245
-
-
Chriqi, A.1
Otrok, H.2
Robert, J.-M.3
-
15
-
-
36549012198
-
The commit protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes
-
S. Eidenbenz, G. Resta, and P. Santi The commit protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes IEEE Transactions on Mobile Computing 7 1 2008 19 33
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 19-33
-
-
Eidenbenz, S.1
Resta, G.2
Santi, P.3
-
16
-
-
0001233090
-
A general theory of rational behavior in game situations
-
J.C. Harsanyi A general theory of rational behavior in game situations Econometrica 34 1966 613 634
-
(1966)
Econometrica
, vol.34
, pp. 613-634
-
-
Harsanyi, J.C.1
-
23
-
-
12244292723
-
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks
-
DOI 10.1016/j.adhoc.2004.07.006, PII S1570870504000575, Ad Hoc Networking for Pervasive Systems
-
P. Michiardi, and R. Molva Analysis of coalition formation and cooperation strategies in mobile adhoc networks Ad hoc Networks 3 2005 193 219 (Pubitemid 40114350)
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.2
, pp. 193-219
-
-
Michiardi, P.1
Molva, R.2
-
24
-
-
51649090164
-
A mechanism design-based multi-leader election scheme for intrusion detection in MANET
-
N. Mohammed, H. Otrok, L. Wang, M. Debbabi, P. Bhattacharya. A mechanism design-based multi-leader election scheme for intrusion detection in MANET, in: Proc. of IEEE Wireless Communications and Networking Conference (WCNC), 2008, pp. 2816-2821.
-
(2008)
Proc. of IEEE Wireless Communications and Networking Conference (WCNC)
, pp. 2816-2821
-
-
Mohammed, N.1
Otrok, H.2
Wang, L.3
Debbabi, M.4
Bhattacharya, P.5
-
25
-
-
84926076710
-
Introduction to mechanism design for computer scientists
-
N. Nisam, T. Roughgarden, E. Tardos, V.V. Vazirani, Cambridge University Press
-
N. Nisan Introduction to mechanism design for computer scientists N. Nisam, T. Roughgarden, E. Tardos, V.V. Vazirani, Algorithmic Game Theory 2007 Cambridge University Press 209 242
-
(2007)
Algorithmic Game Theory
, pp. 209-242
-
-
Nisan, N.1
-
26
-
-
39149117050
-
A game-theoretic intrusion detection model for mobile ad-hoc networks
-
H. Otrok, N. Mohammed, L. Wang, M. Debbabi, and P. Bhattacharya A game-theoretic intrusion detection model for mobile ad-hoc networks Computer Communications 31 2008 708 721
-
(2008)
Computer Communications
, vol.31
, pp. 708-721
-
-
Otrok, H.1
Mohammed, N.2
Wang, L.3
Debbabi, M.4
Bhattacharya, P.5
-
27
-
-
62349113644
-
EE-OLSR: Energy efficient OLSR routing protocol for mobile ad hoc networks
-
F.D. Rango, M. Fotino, S. Marano, EE-OLSR: energy efficient OLSR routing protocol for mobile ad hoc networks, in: Proc. of the Military Communications Conference (MILCOM), 2008, pp. 1-7.
-
(2008)
Proc. of the Military Communications Conference (MILCOM)
, pp. 1-7
-
-
Rango, F.D.1
Fotino, M.2
Marano, S.3
-
29
-
-
24744458342
-
HOLSR: A hierarchical proactive routing mechanism for mobile ad hoc networks
-
DOI 10.1109/MCOM.2005.1470838
-
L. Villasenor-Gonzalez, G.Y. Ge, and L. Lament HOLSR: a hierarchical proactive pouting mechanism for mobile ad hoc networks IEEE Communications Magazine 43 2005 118 125 (Pubitemid 41294647)
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.7
, pp. 118-125
-
-
Villasenor-Gonzalez, L.1
Ge, Y.2
Lamont, L.3
-
30
-
-
33745200525
-
Expected k-coverage in wireless sensor networks
-
L.-H. Yen, C.W. Yu, and Y.-M. Cheng Expected k-coverage in wireless sensor networks Ad Hoc Networks 4 2006 636 650
-
(2006)
Ad Hoc Networks
, vol.4
, pp. 636-650
-
-
Yen, L.-H.1
Yu, C.W.2
Cheng, Y.-M.3
-
31
-
-
34548493227
-
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks : AAAAn integrated approach using game theoretic and cryptographic techniques
-
DOI 10.1007/s11276-006-9855-1, Special Issue: Selected Papers on MOBICOM 2005
-
S. Zhong, L.E. Li, Y.G. Liu, and Y.R. Yang On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretic and cryptographic techniques Wireless Networks 13 2007 799 816 (Pubitemid 47373423)
-
(2007)
Wireless Networks
, vol.13
, Issue.6
, pp. 799-816
-
-
Zhong, S.1
Li, L.E.2
Liu, Y.G.3
Yang, Y.R.4
|