P Michiardi, R Molva - … Communications and Multimedia Security: IFIP TC6 …, 2002 - Springer
Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishness that causes lack of node activity cannot be solved by classical security …
Mobile ad hoc networks (MANETs) operate on the basic underlying assumption that all participating nodes fully collaborate in self-organizing functions. However, performing …
This book provides a comprehensive yet easy coverage of ad hoc and sensor networks and fills the gap of existing literature in this growing field. It emphasizes that there is a major …
Cryptographic mechanisms alone are insufficient to protect Wireless Sensor Networks (WSNs), because sensors are deployed for long periods in hostile environments where it is …
G Takacs, V Chandrasekhar, S Tsai… - 2010 IEEE Computer …, 2010 - ieeexplore.ieee.org
We present a method that unifies tracking and video content recognition with applications to Mobile Augmented Reality (MAR). We introduce the Radial Gradient Transform (RGT) and …
K Islam, W Shen, X Wang - IEEE Transactions on Systems …, 2012 - ieeexplore.ieee.org
Industries can benefit a lot from integrating sensors in industrial plants, structures, machinery, shop floors, and other critical places and utilizing their sensing and monitoring …
A Agah, SK Das - Int. J. Netw. Secur., 2007 - Citeseer
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor …
J Luo, X Liu, M Fan - Computer networks, 2009 - Elsevier
In a mobile ad-hoc network (MANET) environment, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can …
F Hu, NK Sharma - Ad Hoc Networks, 2005 - Elsevier
In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena. As sensor …