Sciweavers

845 search results - page 97 / 169
» Diagnosabilities of regular networks
Sort
View
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 8 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
INFOCOM
2010
IEEE
13 years 6 months ago
Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments
—In this paper, we consider routing in multi-hop wireless mesh networks. We analyze three standardized and commonly deployed routing mechanisms that we term “nodepair discovery...
Stanislav Miskovic, Edward W. Knightly
EWSN
2011
Springer
12 years 11 months ago
Opportunistic Packet Scheduling in Body Area Networks
Significant research efforts are being devoted to Body Area Networks (BAN) due to their potential for revolutionizing healthcare practices. Energy-efficiency and communication re...
Kumar Shashi Prabh, Jan-Hinrich Hauer
GLOBECOM
2007
IEEE
14 years 2 months ago
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
— In Wireless Sensor Networks (WSNs), symmetric key schemes may be used to provide security. Recently, a class of random key pre-distribution techniques have been proposed and in...
Jing Deng, Yunghsiang S. Han
ESAS
2007
Springer
14 years 2 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...