Zobrazeno 1 - 10
of 119
pro vyhledávání: '"NCCR-MICS/CL3"'
Publikováno v:
IEEE/ACM Transactions on Networking. 16:791-802
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc networks have sufficiently redundant paths and counter-DoS mechanisms to m
Publikováno v:
IEEE Wireless Communications. 13:8-15
The road to a successful introduction of vehicular communications has to pass through the analysis of potential security threats and the design of a robust security architecture able to cope with these threats. In this article we undertake this chall
Autor:
N. Ben Salem, Jean-Pierre Hubaux
Publikováno v:
IEEE Wireless Communications. 13:50-55
Using wireless mesh networks to offer Internet connectivity is becoming a popular choice for wireless Internet service providers as it allows fast, easy, and inexpensive network deployment. However, security in WMNs is still in its infancy as very li
Publikováno v:
Capkun, S, Hubaux, J-P & Buttyan, L 2006, ' Mobility Helps Peer-to-Peer Security ', I E E E Transactions on Mobile Computing, vol. 5, no. 1, pp. 43-51 . https://doi.org/10.1109/TMC.2006.12
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, d
Publikováno v:
ACM SIGMOBILE Mobile Computing and Communications Review. 9:69-81
Wi-Fi networks have a very strong potential: They are easy to deploy, they use unlicensed frequencies and they provide internet connectivity that is several times faster than by cable modem. However, two major problems still need to be solved: the la
Publikováno v:
Wireless Networks. 11:177-188
In all-wireless networks, minimizing energy consumption is crucial as in most cases the nodes are battery-operated. We focus on the problem of power-optimal broadcast, for which it is well known that the broadcast nature of radio transmissions can be
Publikováno v:
Ad Hoc Networks. 2:369-386
When striving for reliability, multicast protocols are most commonly designed as deterministic solutions. Such an approach seems to make the reasoning about reliability guarantees (traditionally, binary, “all-or-nothing”-like) in the face of pack
Publikováno v:
Journal of Computer Security. 12:551-587
We propose a formal model of rational exchange and exchange protocols in general, which is based on game theory. In this model, an exchange protocol is represented as a set of strategies in a game that is played by the protocol parties and the networ
Autor:
Jean-Pierre Hubaux, Maxim Raya, Michal Piorkowski, Panos Papadimitratos, Matthias Grossglauser, A. Lezama Lugo
Publikováno v:
ACM SIGMOBILE Mobile Computing and Communications Review. 12:31-33
Realistic simulation is a necessary tool for the proper evaluation of newly developed protocols for Vehicular Ad Hoc Networks (VANETs). Several recent efforts focus on achieving this goal. Yet, to this date, none of the proposed solutions fulfil all
Secure routing protocols for mobile ad hoc networks have been developed recently yet, it has been unclear what are the properties they achieve, as a formal analysis of these protocols is mostly lacking. In this paper we are concerned with this proble
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ada31f2442f7e3ff8f82876e840176b7
http://arxiv.org/abs/0912.5497
http://arxiv.org/abs/0912.5497