Sciweavers

60 search results - page 8 / 12
» Analyzing the energy consumption of security protocols
Sort
View
ACIIDS
2009
IEEE
215views Database» more  ACIIDS 2009»
13 years 11 months ago
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs
The field of wireless sensor network (WSN) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and ...
K. Saleem, Norsheila Fisal, M. S. Abdullah, A. B. ...
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
14 years 5 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
CCS
2006
ACM
14 years 7 days ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
ICDCSW
2003
IEEE
14 years 1 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
SIGMETRICS
2003
ACM
130views Hardware» more  SIGMETRICS 2003»
14 years 1 months ago
Analysis of TCP's computational energy cost for mobile computing
In this paper we present results from a detailed measurement study of TCP (Transmission Control Protocol) running over a wireless link. Our primary goal was on obtaining a breakdo...
Bokyung Wang, Suresh Singh