Learn More
—In this paper, we propose a human-based model which builds a trust relationship between nodes in an ad hoc network. The trust is based on previous individual experiences and on the recommendations of others. We present the Recommendation Exchange Protocol (REP) which allows nodes to exchange recommendations about their neighbors. Our proposal does not(More)
Mobile ad hoc networks are attractive due to the wireless communication, infrastructure-less design, and the self-organized mobile nodes. These features, however, introduce vul-nerabilities, since there are no centralized control elements and the communication depends on cooperation of nodes. We propose a robust and distributed access control mechanism(More)
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes is IP traceback. In this paper, we introduce and analyze a lightweight single-packet IP trace-back system that does not store any data in the network core. The proposed system(More)
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause serious damage to the overall trust evaluation system. This paper presents and analyzes a trust model robust to slander attacks in ad hoc networks. We provide nodes with a mechanism to(More)
Distributed applications use Bloom filters to transmit large sets in a compact form. However , attackers can easily disrupt these applications by using or advertising saturated filters. In this paper we introduce the Generalized Bloom Filter (GBF), a space-efficient data structure to securely represent a set in distributed applications, such as IP(More)
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers the recommendation of trustworthy neighbors and the experience of the node itself. The interactions are limited to direct neighbors in order to scale on mobile networks. The results(More)
This paper analyzes voice transmission capacity on IEEE 802.11 ad hoc networks by performing simulations related to delay, jitter, loss rate, and consecutive losses. We evaluate the influence of mobility on the number of sources transmitting voice. Another issue addressed in this paper is the effect of node density on voice transmission. Our simulation(More)
—In this paper we present a new routing paradigm for wireless multihop networks. In plasma routing, each packet is delivered over the best available path to one of the gateways. The choice of the path and gateway for each packet is not made beforehand by the source node, but rather on-the-fly by the mesh routers as the packet traverses the network. We(More)
—Due to the regional characteristics of the Amazon, waterborne transportation is prevalent. Therefore, the deployment of Vehicular ad hoc networks (VANETs) using boats is considered a technological option to interconnect the region. In this context, contacts between boats can be used to obtain an increased capillarity and efficiency of the network. This(More)