Sciweavers

2200 search results - page 74 / 440
» Hop Integrity in Computer Networks
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
EWSN
2009
Springer
14 years 8 months ago
Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks
As the number of wireless devices sharing the unlicensed 2.4 GHz ISM band increases, interference is becoming a problem of paramount importance. We experimentally investigate the e...
Jan-Hinrich Hauer, Vlado Handziski, Adam Wolisz
WIMOB
2009
IEEE
14 years 2 months ago
Investigating Deployment Strategies for Multi-radio Multi-channel Residential Wireless Mesh Networks
— Multi-radio multi-channel Wireless Mesh Networks (WMNs) are being increasingly deployed for broadband provision in enterprise, community, metropolitan and rural areas, due to t...
Bin Huang, Yan He, Dmitri Perkins
DCOSS
2005
Springer
14 years 1 months ago
TARA: Thermal-Aware Routing Algorithm for Implanted Sensor Networks
Implanted biological sensors are a special class of wireless sensor networks that are used in-vivo for various medical applications. One of the major challenges of continuous in-vi...
Qinghui Tang, Naveen Tummala, Sandeep K. S. Gupta,...
ICN
2005
Springer
14 years 1 months ago
An Energy Constrained Multi-hop Clustering Algorithm for Wireless Sensor Networks
A wireless sensor network is a new kind of wireless Ad-Hoc network consisting of a large number of small low cost, power constrained sensors deployed in a large area for gathering...
Navin Kumar Sharma, Mukesh Kumar