- Cooperative Communication and Network Coding
- Mobile Ad Hoc Networks
- Wireless Communication Security Techniques
- Digital Media Forensic Detection
- Digital and Cyber Forensics
- Privacy-Preserving Technologies in Data
- Opportunistic and Delay-Tolerant Networks
- Advanced Malware Detection Techniques
Carleton University
2012-2013
Cooperative communication has been considered as a promising technique to improve quality of service (QoS) in wireless networks, including mobile ad hoc networks (MANETs). Due their unorganized and decentralized infrastructure, cooperative MANETs (CO-MANETs) are vulnerable attacks initiated on relays. Although encryption authentication protocols may prevent compromised data transmission when selected relay is attacked, cost high. In this paper, we propose game-theoretic approach...
Cooperative communication can improve quality in wireless networks through strategic relay selection. However, cooperative are vulnerable to the attacks initiated on relays. Although applying authentication protocols secure when selected is malicious, better system throughput could be obtained without executing protocol free from attacker's attack. In this paper, a game theoretic approach proposed quantitatively analyze attacking strategies of attacker who chooses one attack so as make...
Cooperative communication is proposed to form a virtual MIMO system through strategic relay selection improve quality in wireless networks, including mobile ad hoc networks (MANETs). Due their unorganized and decentralized infrastructure, MANETs with cooperative communications (CO-MANETs) are vulnerable attacks initiated on relays. Although encryption authentication protocols may prevent compromised data transmission when selected attacked, cost high. In this paper, we propose game theoretic...
Cooperative communication can improve quality in wireless networks through strategic relay selection. However, cooperative are vulnerable to the attacks initiated on relays. Although applying authentication protocols secure when selected is malicious, better system throughput could be obtained without executing protocol free from attacker's attack. In this paper, a game theoretic approach proposed quantitatively analyze attacking strategies of attacker who chooses one attack so as make...