نتایج جستجو برای: routing misbehavior
تعداد نتایج: 54648 فیلتر نتایج به سال:
This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-obj...
VANETs are a subset of Mobile Ad-hoc Networks (MANETs) in which communication nodes are mainly vehicles. Communication in Vehicular ad hoc Network relies on cooperation between vehicles but, a node may behave malicious or selfish in order to get advantage over other vehicles. A misbehaving node may transmit false alerts, tamper messages, create congestion in the network, drop, delay and duplica...
Vehicular ad hoc networks (VANETs) can increase road safety and comfort. It needs strong demand for security because the data sent in VANETs influence vehicles’ behavior. Existing studies have summarized VANET security, challenge, attacks. This study aims to present a comprehensive overview of misbehavior detection VANETs. First, characteristics, issues, attacks are discussed. Then, precise def...
Nash Bargaining Solution (NBS) has been broadly suggested as an efficient solution for problem of fair allocation of multiple resources, namely bandwidth allocation in datacenters. In spite of being thoroughly studied, and provably strategyproof for most scenarios, NBS-based allocation methods lack research on strategic behavior of tenants in case of proportionality of resource demands, which i...
BACKGROUND Personality influences decision making and ethical considerations. Its influence on the occurrence of research misbehavior has never been studied. This study aims to determine the association between personality traits and self-reported questionable research practices and research misconduct. We hypothesized that narcissistic, Machiavellianistic and psychopathic traits as well as sel...
In the modern marketplace, especially when unemployment is high, more and more Americans find themselves overqualified (i.e., possessing more competencies than the job requires). Using and extending person-environment fit theory and the stressor-emotion model of counterproductive work behaviors (CWBs), we examine whether overqualified employees are more likely to display CWBs than employees who...
Ad-hoc networks establish communication in improvised environments without requiring any fixed infrastructure. These networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. Therefore, it is required that the nodes cooperate for the integrity of network operation. However, nodes may refuse to cooperate by not forwarding packets...
Title of dissertation: INTRUSION DETECTION FOR DEFENSE AT THE MAC AND ROUTING LAYERS OF WIRELESS NETWORKS Svetlana Radosavac Doctor of Philosophy, 2007 Dissertation directed by: Professor John S. Baras Department of Electrical and Computer Engineering The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trus...
OBJECTIVES To describe maternal discipline of children in at-risk families and to determine factors associated with disciplinary practices. DESIGN Cross-sectional survey. SETTING At-risk families in North Carolina followed up in a longitudinal study of child maltreatment. PARTICIPANTS Maternal caregivers of 7- to 9-year-old children with factors at birth that placed them at risk. MEASUR...
We present a novel formulation of the problem of energy misbehavior and develop an analytical framework for quantifying its impact on other nodes. Specifically, we formulate two versions of the power control problem for wireless sensor networks with latency constraints arising from duty cycle allocations. In the first version, strategic power optimization, nodes are modeled as rational agents i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید