On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks

Author(s):  
Vasileios Karyotis ◽  
Anastasios Kakalis ◽  
Symeon Papavassiliou
2005 ◽  
Vol 1 (1) ◽  
pp. 9 ◽  
Author(s):  
Ronan De Renesse ◽  
Vasilis Friderikos ◽  
Hamid Aghvami

Ad hoc and sensor networks have received tremendous attention in the recent literature due to its unpredictable nature and its many applications. Imposing any kind of reliability in such networks represents a real challenge. In this paper, we propose a new resource management scheme which virtually reserves and releases resources at the network layer when necessary. Results show that our scheme distributes resources efficiently between Best Effort and Quality of Service traffics even when congestion arises.


2012 ◽  
Vol 35 (3) ◽  
pp. 529-539 ◽  
Author(s):  
Yun-Lu LIU ◽  
Ju-Hua PU ◽  
Wei-Wei FANG ◽  
Zhang XIONG

2011 ◽  
Vol 30 (12) ◽  
pp. 3158-3160
Author(s):  
Jia YU ◽  
Ying-you WEN ◽  
Hong ZHAO
Keyword(s):  
Ad Hoc ◽  

Sign in / Sign up

Export Citation Format

Share Document