Sciweavers

1187 search results - page 160 / 238
» Access control in wireless sensor networks
Sort
View
AINA
2009
IEEE
13 years 5 months ago
A CDMA-Based MAC Protocol in Tree-Topology for Underwater Acoustic Sensor Networks
In this paper, a CDMA-based medium access control (MAC) scheme in underwater acoustic sensor networks is proposed, in which a periodic sleeping mode is jointly employed for the pu...
Jong-Pil Kim, Jae-Won Lee, Youn-Seon Jang, Kweon S...
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 2 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
ICWN
2003
13 years 9 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inefï¬...
Sooksan Panichpapiboon, Jon M. Peha
PERCOM
2006
ACM
14 years 1 months ago
A High-throughput MAC Protocol for Wireless Ad Hoc Networks
One way to improve the throughput of a wireless ad hoc network at the media access (MAC) layer is to allow concurrent transmission among neighboring nodes as much as possible. In ...
Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong ...
GLOBECOM
2010
IEEE
13 years 5 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate