Posts

Showing posts from May, 2011

Best Golf Bags For Sale

Image
golf bag
golf bags
best golf bags
golf bag for sale
golf bag off
golf bag off for slae
best golf bags off for sale

This Week Only: FREE Shipping To Mainland USA &
NO US Sales Tax on All Golf Bags For Sale! Golf Cart Bags Golf Stand Bags Golf Staff Bags Specials for May

Security Improvement of Ad-hoc Networks Routing Protocol

Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks

Image
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks Tootaghaj, Diman Zad;Farhat, Farshid;Pakravan, Mohammad-Reza;Aref, Mohammad-Reza;
Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran
This paper appears in:Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Issue Date : 9-12 Jan. 2011
On page(s): 163
Print ISBN: 978-1-4244-8789-9
Digital Object Identifier :10.1109/CCNC.2011.5766444
Date of Current Version :  12 May 2011 ABSTRACTPerformance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previo…

Risk of attack coefficient effect on availability of Ad-hoc networks

Image
Risk of attack coefficient effect on availability of Ad-hoc networks Tootaghaj, Diman Zad;Farhat, Farshid;Pakravan, Mohammad-Reza;Aref, Mohammad-Reza;
Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran
This paper appears in:Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Issue Date : 9-12 Jan. 2011
On page(s): 166
Print ISBN: 978-1-4244-8789-9
Digital Object Identifier :10.1109/CCNC.2011.5766445
Date of Current Version :  12 May 2011 ABSTRACTSecurity techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be …

Game-Theoretic Approach in Network Security, Availability and Privacy

Image
Game-Theoretic Network SimulatorThis is GTNS: game theoretic network simulator help document. In order to download GTNS click it. To download samples click it!Introduction:GTNS is a discrete-event network simulator targeted primarily for research and educational use.GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected after eliminating selfish/malicious nodes. The key feature of LMAR to seek safe route free of selfish and malicious nodes in polynomial time is its searching algorithm and flooding stage that its generated traffic is equi-loaded compare…