Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
This paper analyzes the energy consumption of ad hoc nodes using IEEE 802.11 interfaces. Our objective is to provide theoretical limits on the lifetime gains that can be achieved b...
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
- In this paper, we describe a group key management protocol for hierarchical sensor networks where instead of using pre-deployed keys, each sensor node generates a partial key dyn...
Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bha...
Abstract-- As the distance between terminals in modern wireless networks tends to decrease, the energy consumption issue, conventionally assumed to be exclusively dominated by the ...
Igor Stanojev, Osvaldo Simeone, Yeheskel Bar-Ness,...