Wireless-NS2
SecureMAC Securing Wireless Medium Access Control Against Insider Denial of Service Attacks
Wireless network dynamically allocates channel resources to improve spectral efficiency and, to avoi..
Securing the Backpressure Algorithm for Wireless Networks
The backpressure algorithm is known to provide throughput optimality in routing and scheduling decis..
SIR a secure and intelligent routing protocol for vehicular ad hocnetwork
: Security in routing is an important issue in vehicular ad hoc network (VANET) to protect the valua..
Spectrum Aware Anypath Routing in Multi Hop Cognitive Radio Networks
Cognitive radio networks (CRNs) have been emerging as a promising technique to improve the spectrum ..
Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing
Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio ne..
Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks
We address how to design a distributed movement strategy for mobile collectors, which can be eithe..
Traffic De correlation Techniques for Countering a Global Eavesdropper in WSNs
We address the problem of preventing the inference of contextual information in event-driven wireles..
Trust Management for Vehicular Networks An Adversary-Oriented Overview
Cooperative Intelligent Transportation Systems, mainly represented by vehicular ad hoc networks (VAN..
Uplink Energy-Delay Trade-Off under Optimized Relay Placement in Cellular Networks
Relay nodes-enhanced architectures are deemed a viable solution to enhance coverage and capacity o..
Uplink Energy-Efficient Load Balancing Over Multipath Wireless Networks
This letter studies the case of multi-interface mobile devices transmitting video traffic over mul..
Vulnerable Concealed Map Reading Inside Mobile Ad Hoc Networks
— Number of techniques has been used based on packet encryption to protect the data forwarding in M..
Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks
Number of techniques has been used based on packet encryption to protect the data forwarding in MAN..