3,798 Hits in 5.5 sec

In reputation we believe: query processing in mobile ad-hoc networks

F. Perich, A. Joshi, J. Undercoffer, T. Finin, L. Kagal, Y. Yesha
The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.  
Research on data management in mobile ad-hoc networks focuses on discovering sources and acquiring information.  ...  In mobile ad-hoc networks, sources may provide faulty information, which can lead to incorrect conclusions.  ...  A successful mechanism for evaluating device integrity and information accuracy must address the inherent limitations of mobile ad-hoc networks and of mobile devices.  ... 
doi:10.1109/mobiq.2004.1331739 dblp:conf/mobiquitous/PerichUKJFY04 fatcat:2ssnmzmctvamxh3v75jak3bbju

Trust in Pervasive Computing [chapter]

Jim Parker, Anand Patwardhan, Filip Perich, Anupam Joshi, Tim Finin
2006 The Handbook of Mobile Middleware  
Pervasive environments are comprised of resource-constrained mobile devices "limited" in their connectivity to other devices or networks due to the inherent dynamic nature of the environment.  ...  However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust, and determining reliability and accuracy of peer-provided data in such interactions are still lacking.  ...  The model functions as an extension to a traditional query processing model for mobile ad hoc networks.  ... 
doi:10.1201/9781420013153.ch21 fatcat:poyrc5s5ynbezeziwn6z4h5pfy

Query distribution estimation and predictive caching in mobile ad hoc networks

Sheetal Gupta, Anupam Joshi, Justin Santiago, Anand Patwardhan
2008 Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access - MobiDE '08  
Keywords Mobile ad hoc networks, query distribution estimation, increase data availability.  ...  The problem of data management has been studied widely in the field of mobile ad-hoc networks and pervasive computing.  ...  We focus on mobile ad hoc networks where a small fraction of the nodes in the network are initially trusted, and we determine the reputation of the other nodes.  ... 
doi:10.1145/1626536.1626542 dblp:conf/mobide/GuptaJSP08 fatcat:5dglbrn6bfecvlb5curwedr7oe

Handling Selfishness in MANETs – A Survey

2014 International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering  
In mobile ad hoc network, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes.  ...  A mobile ad hoc network (MANET) is an infrastructure-less network with self-configuring capability of mobile nodes connected wirelessly.  ...  DCG method creates groups of mobile nodes that are bi-connected in an ad hoc network.  ... 
doi:10.15662/ijareeie.2014.0311036 fatcat:jo6dpenf5nhm3kr25y7qpyj5ty

Decentralized Self-Management of Trust for Mobile Ad Hoc Social Networks

Juan Li, Qingrui Li
2011 International Journal of Computer Networks & Communications  
These new mobile social networks shift from the existing social networking archetype towards a mobile ad hoc networking mode that can potentially connect any type of devices that are equipped with short-range  ...  A few infrastructures, for example, Jambo Networks [17], Nokia Sensor [18] and MobiLuck [34], have been emerged as trials to build ad hoc social networks spontaneously from the mobile devices.  ...  This motivates a new generation of social networks, mobile ad hoc social networks.  ... 
doi:10.5121/ijcnc.2011.3601 fatcat:sz6nr6ptwvapvjrku3go3vargu

Reinventing Mobile Community Computing and Communication

Yann Busnel, Nuno Cruz, Denis Gillet, Adrian Holzer, Hugo Miranda
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
In this paper, we claim that a fundamental paradigm shift in communication is required to allow such application to see the light of day.  ...  Such services would require massive data collection, processing and communication between mobile devices.  ...  CONCLUSION Developing advanced social networking apps (SNAPPs) is a challenging task. We believe that it will involve dramatic paradigm shifts in the way we think about mobile distributed systems.  ... 
doi:10.1109/trustcom.2013.175 dblp:conf/trustcom/BusnelCGHM13 fatcat:gi4lcvxmj5aovd4q4trkvluzti

Secure routing for mobile ad hoc networks

P.G. Argyroudis, D. O'Mahony
2005 IEEE Communications Surveys and Tutorials  
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks.  ...  A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies.  ...  This material is based in part upon works supported by Science Foundation Ireland under grant number 03/CE3/I405.  ... 
doi:10.1109/comst.2005.1610547 fatcat:tm3klt5asnatfhze2ipqyuptxq

A Highly Reliable Access Control Model for Ad Hoc Networks

Insoo Cho, Man Ju Lee, Tea Sang Yun, Jung Ah Kim
2007 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)  
Unlike the conventional networks, the unique characteristics of mobile ad hoc networks (MANETs) pose a number of nontrivial challenges for pervasive service provision.  ...  In this study, we show how trust evaluation process of a system can be based on previous interactions and peer recommendations.  ...  In the field of ad hoc networks, a key property is that it contains mobile computers or devices [7] .  ... 
doi:10.1109/npc.2007.96 fatcat:hcfsxee4u5emlkcaxbl3bktcje

An Economic Approach to Hierarchical Routing in Resource Rationed Ad Hoc Networks

Wenjing Wang, Mainak Chatterjee, Kevin Kwiat
2007 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks  
In this paper, we focus on the problem of routing in resource rationed ad hoc networks.  ...  Our approach begins with a hierarchical bidding process, through which nodes in the network bid for virtual currency.  ...  In Section 2, we introduce the related work on economic approaches in ad hoc network design.  ... 
doi:10.1109/wowmom.2007.4351780 dblp:conf/wowmom/WangCK07 fatcat:k3sovqyq35detn5tc6pydytsua


Christian Artigues, Emmanuelle Anceaume, Sébastien Gambs, Gilles Guette, Michel Hurfin, Frédéric Schettini, Yves Deswarte, Jérémie Guiochet, Marie-José Huguet, Marc-Olivier Killijian, David Powell, Matthieu Roy (+2 others)
2012 Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience - ARMOR '12  
We present the AMORES project, which aims to provide an architecture for the provision of privacy preserving and resilient collaborative services in "mobiquitous" (i.e., mobile and ubiquitous) systems.  ...  The project is built around three use-cases from the area of public transportation: (1) dynamic carpooling, (2) real-time computation of multimodal transportation itineraries and (3) mobile social networking  ...  Use-cases The chosen application domain is public transportation, which, in our opinion, is a good setting for providing location-based services on top of mobile ad hoc networks.  ... 
doi:10.1145/2222436.2222443 fatcat:7ydtqwem5rdsjl5og6zdshxffq

MobiTrust: Trust Management System in Mobile Social Computing

Juan Li, Zonghua Zhang, Weiyi Zhang
2010 2010 10th IEEE International Conference on Computer and Information Technology  
A set of simulations is conducted to evaluate our system deployed in a mobile social network in the presence of dishonest users.  ...  Due to the rapid development of mobile computing technology and social network service, mobile social network emerges as a new network paradigm, which significantly facilitates the communication and resource  ...  ACKNOWLEDGEMENT The research developed in this paper is supported by North Dakota State EPSCoR under the Infrastructure Improvement Program FAR-0015846.  ... 
doi:10.1109/cit.2010.176 dblp:conf/IEEEcit/LiZZ10 fatcat:s53ag36mdjfftorbpspoznmdsi

Self-Policing Mobile Ad Hoc Networks [chapter]

Jean-Yves Le Boudec, Sonja Buchegger
2004 Mobile Computing Handbook  
We discuss the trade-offs and issues of self-policing mobile ad-hoc networks and give an overview of the state of the art, discussing and contrasting several solution proposals.  ...  Misbehavior in mobile ad-hoc networks occurs for several reasons. Selfish nodes misbehave to save power or to improve their access to service relative to others.  ...  Issues in Reputation Systems for Mobile Ad-hoc Networks The self-policing systems proposed in the literature differ in several aspects which we explain in the following.  ... 
doi:10.1201/9780203504086.ch20 fatcat:z3fiv4t77nasfley3vanezkt34

Selfish Node Detection in Replica Allocation over MANETs

Kishore Kumar
2013 IOSR Journal of Computer Engineering  
In this paper, we examine the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation. We term this selfish replica allocation.  ...  In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation.  ...  The mobile wireless network is infrastructure less in manner commonly known as a mobile ad hoc network (MANET).  ... 
doi:10.9790/0661-1350713 fatcat:prrk2bmhjrehvcbr36botv57x4

Detecting the Sybil Attack in Wireless Sensor Network :Survey

A.V Pramod, Md. Abdul Azeem, M. Om Prakash
Mobility is frequently a problem for providing security services in ad hoc networks. In this paper, we render that mobility can alsobe used to enhance security.  ...  Specifically, we render that nodes which are in passively monitor traffic in the network can able to detect a Sybil attacker which uses a number of network identities simultaneously.  ...  Reputation Schemes. Security mechanisms include protocols for determining and maintaining reputation information about nodes for ad hoc networks.  ... 
doi:10.24297/ijct.v3i1c.2770 fatcat:5p6lvu44nrf37e5kxrsjulrrn4

A secure credit-based cooperation stimulating mechanism for MANETs using hash chains

Hamed Janzadeh, Kaveh Fayazbakhsh, Mehdi Dehghan, Mehran S. Fallah
2009 Future generations computer systems  
One of the most challenging problems in self-organized mobile ad hoc networks (MANETs), which consist of autonomous and self-interested nodes, is to stimulate the nodes to cooperate in routing and packet  ...  We show that it imposes a low workload on the nodes in comparison with the mechanisms that deploy digital signature schemes.  ...  Moreover, in this section the role of hash chains in mobile ad hoc networks has been investigated.  ... 
doi:10.1016/j.future.2008.12.002 fatcat:mshfcoac3jeajj3qb3nitrsiha
« Previous Showing results 1 — 15 out of 3,798 results