Towards securing peer-to-peer sip in the manet context: existing work and perspectives

A Davoust, F Gagnon, B Esfandiari… - … on Internet of Things …, 2017 - ieeexplore.ieee.org
The Session Initiation Protocol (SIP) is a key building block of many social applications,
including VoIP communication and instant messaging. In its original architecture, SIP heavily …

[PDF][PDF] Improvements in navy data networks and tactical communication systems

L Enel, F Guillem - International Journal of Computer and Information …, 2008 - Citeseer
This paper considers the benefits gained by using an efficient quality of service
management such as DiffServ technique to improve the performance of military …

[PDF][PDF] Toward Testing Security Attacks and Defense Mechanisms for P2PSIP in MANETs with a Simulator.

A Cormier, F Gagnon, B Esfandiari, T Kunz - DCNET, 2017 - scitepress.org
Mobile Ad hoc NETworks (MANETs) are comprised of mobile devices communicating with
each other over multi-hop wireless links. Because they do not require any fixed …

[PDF][PDF] Напрямки підвищення ефективності функціонуваннятактичних мобільних радіомереж

ВА Романюк - Збірник наукових праць [Військового інституту …, 2013 - irbis-nbuv.gov.ua
В останнє десятиріччя розвинуті країни світу особливу увагу приділяють створенню
перспективних тактичних радіомереж. До них пред'являються наступні основні вимоги …

Approaches to Securing P2PSIP in MANETs

T Kunz - … : 14th International Joint Conference, ICETE 2017 …, 2019 - books.google.com
This paper studies the security for Voice over IP in peer-topeer (P2P) networks. Instead of
taking a general approach to security in P2P, we focus on a specific use case, namely …

Scheduling distributed real-time tasks in unreliable and untrustworthy systems

K Han - 2010 - vtechworks.lib.vt.edu
In this dissertation, we consider scheduling distributed soft real-time tasks in unreliable (eg,
those with arbitrary node and network failures) and untrustworthy systems (eg, those with …

Subscriber mobility management for a P2P publish/subscribe overlay in mobile tactical networks

A Gaddah, L Li, T Kunz - Peer-to-peer networking and applications, 2009 - Springer
Abstract P2P (Peer-to-Peer) overlay is a promising distributed computing and
communication paradigm that allows for a group of participants to share information and …

Approaches to Securing P2PSIP in MANETs

A Cormier, F Gagnon, B Esfandiari, T Kunz - E-Business and …, 2019 - Springer
This paper studies the security for Voice over IP in peer-to-peer (P2P) networks. Instead of
taking a general approach to security in P2P, we focus on a specific use case, namely …

P2PSIP over MANETs: Approaches to a Secure Implementation

A Cormier - 2018 - repository.library.carleton.ca
We propose two different approaches to implement the peer-to-peer (P2P) version of the
Session Initiation Protocol (SIP) in mobile ad hoc networks (MANETs), focusing on private …

Directions of Mobile Ad Hoc Networks efficiency increase

VA Romanjuk, OY Sova - Information and Telecommunication …, 2014 - infotelesc.kpi.ua
The directions of efficiency increase of the self-organizing wireless networks MANET are
proposed. They consist in the implementation of new methods and radio network …