Sciweavers

1440 search results - page 187 / 288
» A protocol for packet network intercommunication
Sort
View
JSAC
2006
156views more  JSAC 2006»
15 years 4 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
140
Voted
WASA
2009
Springer
103views Algorithms» more  WASA 2009»
15 years 9 months ago
Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks
Mobile underwater sensor networks are usually featured with three-dimensional topology, high node mobility and long propagation delays. For such networks, geographic routing has be...
Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zh...
JCM
2006
77views more  JCM 2006»
15 years 4 months ago
Promote the Use of Explicit Delay Control
The Internet is undergoing changes of its traffic mix, with the IP-based interactive multimedia applications gaining momentum. According to studies, UDP-based multimedia traffic ha...
Xiaoyuan Gu, Dirk Markwardt, Lars C. Wolf
EWSN
2009
Springer
16 years 5 months ago
Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks
As many radio chips used in today's sensor mote hardware can work at different frequencies, several multi-channel communication protocols have recently been proposed to improv...
Xiaodong Wang, Xiaorui Wang, Xing Fu, Guoliang Xin...
SIGCOMM
2010
ACM
15 years 4 months ago
SourceSync: a distributed wireless architecture for exploiting sender diversity
Diversity is an intrinsic property of wireless networks. Recent years have witnessed the emergence of many distributed protocols like ExOR, MORE, SOAR, SOFT, and MIXIT that exploi...
Hariharan Rahul, Haitham Hassanieh, Dina Katabi