Search For:

Displaying 1-6 out of 6 total
Performance Analysis of the IEEE 802.11 MAC and Physical Layer Protocol
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Mohammad Hossein Manshaei, Gion Reto Cantieni, Chadi Barakat, Thierry Turletti
Issue Date:June 2005
pp. 88-97
We present in this paper an analytical model that accounts for the positions of stations with respect to the Access Point (AP) while evaluating the performance of 802.11 MAC layer. Our work is based on the Bianchi?s model where the performance of 802.11 MA...
 
Game theory meets network security and privacy
Found in: ACM Computing Surveys (CSUR)
By Jean-Pierre Hubaux, Mohammad Hossein Manshaei, Quanyan Zhu, Tamer Bacşar, Tansu Alpcan
Issue Date:June 2013
pp. 1-39
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in ad...
     
On non-cooperative location privacy: a game-theoretic analysis
Found in: Proceedings of the 16th ACM conference on Computer and communications security (CCS '09)
By David C. Parkes, Jean-Pierre Hubaux, Julien Freudiger, Mohammad Hossein Manshaei
Issue Date:November 2009
pp. 324-337
In mobile networks, authentication is a required primitive for the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication. A frequently proposed solution to protect loca...
     
Revocation games in ephemeral networks
Found in: Proceedings of the 15th ACM conference on Computer and communications security (CCS '08)
By Jean-Pierre Hubaux, Mark Felegyhazi, Maxim Raya, Mohammad Hossein Manshaei
Issue Date:October 2008
pp. 79-79
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact times between nodes are short and neighbors change frequently - reputations ...
     
Optimal pricing strategy for wireless social community networks
Found in: Proceedings of the 3rd international workshop on Economics of networked systems (NetEcon '08)
By Amin Mazloumian, Jean-Pierre Hubaux, Mark Felegyhazi, Mohammad Hossein Manshaei
Issue Date:August 2008
pp. 107-112
Wireless social community operators rely on subscribers who constitute a community of users. The pricing strategy of the provided wireless access is an open problem for this new generation of wireless access providers. In this paper, using both analytical ...
     
IEEE 802.11 rate adaptation: a practical approach
Found in: Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM '04)
By Mathieu Lacage, Mohammad Hossein Manshaei, Thierry Turletti
Issue Date:October 2004
pp. 126-134
Today, three different physical (PHY) layers for the IEEE 802.11 WLAN are available (802.11a/b/g); they all provide multi-rate capabilities. To achieve a high performance under varying conditions, these devices need to adapt their transmission rate dynamic...
     
 1