I Chlamtac, M Conti, JJN Liu - Ad hoc networks, 2003 - Elsevier
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …
P Michiardi, R Molva - … Communications and Multimedia Security: IFIP TC6 …, 2002 - Springer
Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishness that causes lack of node activity cannot be solved by classical security …
Mobile ad hoc networks (MANETs) operate on the basic underlying assumption that all participating nodes fully collaborate in self-organizing functions. However, performing …
This book provides a comprehensive yet easy coverage of ad hoc and sensor networks and fills the gap of existing literature in this growing field. It emphasizes that there is a major …
Cryptographic mechanisms alone are insufficient to protect Wireless Sensor Networks (WSNs), because sensors are deployed for long periods in hostile environments where it is …
G Takacs, V Chandrasekhar, S Tsai… - 2010 IEEE Computer …, 2010 - ieeexplore.ieee.org
We present a method that unifies tracking and video content recognition with applications to Mobile Augmented Reality (MAR). We introduce the Radial Gradient Transform (RGT) and …
K Islam, W Shen, X Wang - IEEE Transactions on Systems …, 2012 - ieeexplore.ieee.org
Industries can benefit a lot from integrating sensors in industrial plants, structures, machinery, shop floors, and other critical places and utilizing their sensing and monitoring …
A Agah, SK Das - Int. J. Netw. Secur., 2007 - Citeseer
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor …
J Luo, X Liu, M Fan - Computer networks, 2009 - Elsevier
In a mobile ad-hoc network (MANET) environment, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can …