I
Imad Aad
Researcher at Nokia
Publications - 80
Citations - 4492
Imad Aad is an academic researcher from Nokia. The author has contributed to research in topics: IEEE 802.11 & Wireless network. The author has an hindex of 28, co-authored 80 publications receiving 4394 citations. Previous affiliations of Imad Aad include NTT DoCoMo & French Institute for Research in Computer Science and Automation.
Papers
More filters
Proceedings ArticleDOI
Differentiation mechanisms for IEEE 802.11
Imad Aad,Claude Castelluccia +1 more
TL;DR: This work presents three service differentiation schemes for IEEE 802.11 based on scaling the contention window according to the priority of each flow or user, and simulates and analyzes the performance of each scheme with TCP and UDP flows.
The Mobile Data Challenge: Big Data for Mobile Computing Research
J. Laurila,Daniel Gatica-Perez,Imad Aad,Blom J.,Olivier Bornet,Trinh-Minh-Tri Do,Olivier Dousse,Julien Eberle,Markus Miettinen +8 more
TL;DR: An overview of the Mobile Data Challenge (MDC), a large-scale research initiative aimed at generating innovations around smartphone-based research, as well as community-based evaluation of related mobile data analysis methodologies, is presented.
Journal ArticleDOI
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
TL;DR: This paper proposes protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system, and shows that the distributed approach to contain nodes and contribute to their eviction is efficiently feasible and achieves a sufficient level of robustness.
Proceedings ArticleDOI
On selfish behavior in CSMA/CA networks
TL;DR: A game-theoretic approach is used to investigate the problem of the selfish behavior of nodes in CSMA/CA networks, and a simple, localized and distributed protocol is developed that successfully guides multiple selfish nodes to a Pareto-optimal Nash equilibrium.
Proceedings ArticleDOI
Denial of service resilience in ad hoc networks
TL;DR: This paper design and study DoS attacks in order to assess the damage that difficult-to-detect attackers can cause, and quantifies via simulations and analytical modeling the scalability of doS attacks as a function of key performance parameters such as mobility, system size, node density, and counter-DoS strategy.