Sciweavers

423 search results - page 19 / 85
» Design of a Password-based Authentication Method for Wireles...
Sort
View
IJSNET
2007
91views more  IJSNET 2007»
13 years 7 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
ICUIMC
2011
ACM
12 years 10 months ago
A cross-layer design for resource allocation and congestion control in multichannel multi-hop cognitive radio networks
Efficient and fair resource allocation associated with congestion control in multi-hop cognitive radio networks (CRN) is a challenging problem. In this paper, we consider their mu...
Nguyen Van Mui, Choong Seon Hong
WCNC
2008
IEEE
14 years 1 months ago
How Much Improvement Can We Get From Partially Overlapped Channels?
—Partially Overlapped Channel (POC) based design, has been identified recently as a promising technique to overcome the capacity bottleneck facing wireless engineers in various ...
Zhenhua Feng, Yaling Yang
WS
2004
ACM
14 years 24 days ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
DATE
2006
IEEE
128views Hardware» more  DATE 2006»
13 years 11 months ago
Platform-based design of wireless sensor networks for industrial applications
We present a methodology, an environment and supporting tools to map an application on a wireless sensor network (WSN). While the method is quite general, we use extensively an exa...
Alvise Bonivento, Luca P. Carloni, Alberto L. Sang...