Sciweavers

333 search results - page 62 / 67
» An optimized authentication protocol for mobile network reco...
Sort
View
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
14 years 2 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
MSN
2007
Springer
125views Sensor Networks» more  MSN 2007»
14 years 2 months ago
Ensuring Area Coverage in Hybrid Wireless Sensor Networks
Success of Wireless Sensor Networks largely depends whether the deployed network can provide desired coverage with acceptable network lifetime. This paper proposes a distributed pr...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
SASN
2003
ACM
14 years 2 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ICCCN
2007
IEEE
14 years 3 months ago
Infrastructure for Cross-Layer Designs Interaction
Abstract—The current system design of mobile ad hoc networks (MANET), derived from their traditional fixed counterparts, cannot fully meet the requirements inherent to the dynam...
Zhijiang Chang, Georgi Gaydadjiev, Stamatis Vassil...
JUCS
2007
93views more  JUCS 2007»
13 years 8 months ago
Quality of Service Routing in a MANET with OLSR
: Ad hoc wireless networks have enormous commercial and military potential because of their self-organizing capacity and mobility support. However, some specificities of these net...
Dang-Quan Nguyen, Pascale Minet