Sciweavers

470 search results - page 56 / 94
» A secure alternate path routing in sensor networks
Sort
View
SASN
2005
ACM
14 years 1 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra
COMCOM
2007
136views more  COMCOM 2007»
13 years 8 months ago
Demand-scalable geographic multicasting in wireless sensor networks
In this paper, we focus on the challenge of demand-scalable multicast routing in wireless sensor networks. Due to the ad-hoc nature of the placement of the sensor nodes as well as...
Shibo Wu, K. Selçuk Candan
PIMRC
2008
IEEE
14 years 2 months ago
Engineering wireless mesh networks
Abstract—Wireless mesh networks are considered as a potential attractive alternative to provide broadband access to users. They have been studied extensively by the research comm...
Catherine Rosenberg, Jun Luo, André Girard
ICNP
2003
IEEE
14 years 1 months ago
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Structured peer-to-peer overlays provide a natural infrastructure for resilient routing via efficient fault detection and precomputation of backup paths. These overlays can respo...
Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony...
CCS
2011
ACM
12 years 8 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...