displaying 1000 best results Help
Search results for: SELFISH NODES
-
LECTURE NOTES IN COMPUTER SCIENCE
Journals -
Ad Hoc WLAN with Selfish, Secretive, and Short-Sighted Stations
PublicationPrzy pomocy aparatu matematycznego tzw. gier na wyniszczenie przeanalizowano równowagowe strategie żądań transferu sesji danych w sieciach lokalnych z dostępem do medium metodą aukcji. Zwrócono uwagę na zjawisko dołączania do sesji ruchu pojawiającego się już po procedurze aukcji i pokazano, w jaki sposób wpływa to na strategie stacji.
-
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
Publication. Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
QoS-sensitive selfish behavior in ad hoc wireless lans: a stochastic game model
PublicationRozważany jest prosty model stacji sieci bezprzewodowej wprowadzają-cych ruch elastyczny przy wymaganiu minimalnej przepływności. Każda stacja, okresowo przełączając się na egoistyczną konfigurację MAC, próbuje wyeliminować inne stacje z ubiegania się o pasmo sieci. Dla powstającej w ten sposób gry zastosowano model gry markowowskiej i pokazano istnienie symetrycznego punktu równowagi strategicznej.
-
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
PublicationIn wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...
-
The Symmetry of GPS Orbit Ascending Nodes
Publication -
An Idea Bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs
PublicationDla klasy protokołów MAC opartych na przypadkowo krążącym żetonie dononano rozdziału polityki wyłaniania zwycięzcy od strategii wyboru szczeliny dla żądania dostępu. Wyróżniono klasę protokołów RT/ECD, dla której zidentyfikowano typ wynikowej gry niekooperacyjnej. Pokazano, że gra ta zasadniczo różni się od wieloosobowego dylematu więźnia. Zaprojektowano heurystyczną strategię asymptotycznie zniechęcającą do zachowań egoistycznych...
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublicationA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Self-Organizing Wireless Nodes Monitoring Network
PublicationThe concept of data monitoring system and self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the wireless monitoring system for containers, and the second is the mobile monitoring system for gas air pollution measurements.
-
Remote DHCPv6 autoconfiguration for mobile IPv6 nodes
PublicationPrzedstawiono ideę przełączania międzydomenowego węzłów wspierających protokół IPv6, z wykorzystaniem procedur stanowej (statefull) z użyciem serwerów autokonfiguracji DHCPv6. Dokonano analizy czasu trwania procesów przełączania w warstwach: drugiej i trzeciej. Zaproponowano zmodyfikowaną metodę autokonfiguracji węzła, pozwalającą na wyeliminowanie przerwy w transmisji związanej z wykrywaniem zduplikowanych adresów (Duplicate Address...
-
Notes
Journals -
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
FISH & SHELLFISH IMMUNOLOGY
Journals -
JOURNAL OF SHELLFISH RESEARCH
Journals -
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
Pemphigus foliaceus in a patient with skin cancer with metastases to lymph nodes
Publication -
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublicationIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
Distributed state estimation using a network of asynchronous processing nodes
PublicationWe consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...
-
LDPC Codes performance investigation
Publication...
-
Electronic Noses in Medical Diagnostics
PublicationElectronic nose technology is being developed in order to identify aromas in a way parallel to the biologic olfaction. When applied to the field of medicine, such device should be able to identify and discriminate between different diseases. In recent years this kind of approach finds application in medical diagnostics, and especially in disease screening. Despite the fact that devices utilizing chemical sensor arrays are not routinely...
-
Electronic Noses and Electronic Tongues
PublicationChapter 7 reports the achievements on the field of artificial senses, such as electronic nose and electronic tongue. It examines multivariate data processing methods and demonstrates a promising potential for rapid routine analysis. Main attention is focused on detailed description of sensor used, construction and principle of operation of these systems. A brief review about the progress in the field of artificial senses and future trends...
-
Taxonomical Notes onPachygenium(Orchidaceae)
Publication -
Position and Orientation Estimation in Radio Network With Groups of Locally Synchronized Nodes
PublicationThis article presents a positioning system with groups of locally synchronized nodes. A mobile object is equipped with a group of several synchronized receivers that are able to measure the difference in the time of arrival of signals from reference transmitters. The reference transmitters are synchronized only in local groups, with no global synchronization between groups. It is assumed that the synchronous operation of transmitters...
-
The reliability of any-hop star networks with respect to failures of communication nodes.
PublicationThis paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...
-
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes
Publication -
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
PublicationIn Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...
-
Pynchon Notes
Journals -
Romance Notes
Journals -
Notes & Queries
Journals -
Notes Konserwatorski
Journals -
Economic Notes
Journals -
Herpetology Notes
Journals -
Notes Muzyczny
Journals -
Notes on the lichen genus Ochrolechia in Bolivia
Publication -
Modes of vibrations occuring in the washboarding phenomenon
PublicationW oparciu o współczesną literaturę oraz wyniki badań własnych przedstawiono teorie zjawiska washboarding dla obróbki na pilarkach taśmowych z użyciem wąskich i szerokich pił. Zaprezentowano również wytłumaczenie wspomnianego zjawiska dla przypadku obróbki na pilarkach ramowych. Poprzez analogię do drgań typu chatter (drgania samowzbudne w obróbce metali) zaproponowano nazwy regenerative washboarding, dla drgań samowzbudnych na...
-
Conducting coatings as anodes in cathodic protection
PublicationPrzedstawiono wyniki pomiarów elektrochemicznych powłok przewodzących opartych o mieszaninę pigmentów węglowych osadzonych w matrycy polimerowej. Wyznaczono parametry powłok przewodzących w oparciu o metodę elektrochemicznej spektroskopii impedancyjnej. Parametry elektryczne i elektrochemiczne były wyznaczane jednocześnie, w czasie długotrwałej anodowej polaryzacji badanych powłok. Stwierdzono, że badane powłoki mogą być używane...
-
Asymmetrical Modes in Polyphase Motors and Drives
PublicationThe effect of power supply and/or motor asymmetry on the phase-load distribution and the ripple of electromagnetic torque in a polyphase drive is studied by the method of symmetrical components. It is shown that the presence of asymmetry causes the mapping of all harmonics in the supply voltage into all planes of symmetrical components and eliminates the possibility of independent control of harmonics. The dynamic model of a five-phase...
-
Comparing Phylogenetic Trees by Matching Nodes Using the Transfer Distance Between Partitions
PublicationAbility to quantify dissimilarity of different phylogenetic trees describing the relationship between the same group of taxa is required in various types of phylogenetic studies. For example, such metrics are used to assess the quality of phylogeny construction methods, to define optimization criteria in supertree building algorithms, or to find horizontal gene transfer (HGT) events. Among the set of metrics described so far in...
-
Using trust management model for detection of faulty nodes in Wireless Sensor Networks
Publication -
A framework for detection of selfishness in multihop mobile ad hoc networks
PublicationThe paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...
-
Boundary value problems for ODEs.
PublicationPrzedmiotem badań są problemy brzegowe dla równań różniczkowych zwyczajnych.W zależności od parametru lambda [występującego w warunku brzegowym] zdefiniowano ciągi monotoniczne i stosując metodę kwasi linearyzacji pokazano,że przy pewnych założeniach ciągi te są zbieżne do jedynego rozwiązania problemu brzegowego i jest to zbieżność kwadratowa. W pracy zawarte są pewne rozważania dotyczące brzegowych nierówności różniczkowych.
-
The complexity of node blocking for dags
PublicationRozważamy następującą grę (pomiędzy dwoma graczami) kombinatoryczną o nazwie ''node blocking''. Dany jest graf skierowany. Każdy wierzchołek może być zajęty przez co najwyżej jeden token. Wyróżniamy dwa kolory tokenów, biały i czarny, każdy gracz może przemieszczać tylko własne tokeny. Gracze wykonują ruchy naprzemiennie. Ruch polega na wyborze dowolnego tokena własnego koloru i przesunięciu go na dowolnego niezajętego przez inny...
-
Genetic identifiability of selected populations of Indian mackerel, Rastrelliger kanagurta (Actinopterygii: Perciformes: Scombridae)—CELFISH Project—Part 1
Publication -
Remote Stateful Autoconfiguration for Mobile IPv6 Nodes with Server Side Duplicate Address Detection
PublicationDuring interdomain handover, IPv6 node requires new address at its new location. Once the L2 handover procedure is completed, mobile node (MN) starts its IPv6 configuration, using stateless (router advertisements) or stateful (DHCPv6 communication) mode. Once the address is obtained, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on the interface type, this procedure may easily take...
-
Conducting composites as cable anodes in cathodic protection
PublicationOpisano zasadę działania oraz podstawowe parametry charakteryzujące układ anodowy z wykorzystaniem anod kablowych w systemie ochrony katodowej podziemnych konstrukcji. W tej metodzie ochrony jako materiał anodowy wykorzystywany jest kompozyt przewodzący, którego właściwości mechaniczne umożliwiają budowę anody w formie kabla biegnącego wzdłuż trasy konstrukcji podziemnej. Wykazano, że zawartość grafitu w elektrodzie kompozytowej...
-
On the size of identifying codes in triangle-free graphs
PublicationIn an undirected graph G, a subset C⊆V(G) such that C is a dominating set of G, and each vertex in V(G) is dominated by a distinct subset of vertices from C, is called an identifying code of G. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph G, let gammaID(G) be the minimum cardinality of an identifying code in G. In this paper, we show that for any connected...
-
Magnetic instrumentation and other applications of magnets in NOTES
PublicationModern surgery is developing towards a minimally invasive approach. To minimize the trauma the number of ports is either limited as in single incision laparoscopic procedures or ports are introduced through natural orifices as in nat- ural orifice translumenal endoscopic surgery (NOTES). To provide surgeons with appropriate instrumentation novel technologies are employed involving magnets. This article summarizes the theoretical...