Sciweavers

422 search results - page 63 / 85
» Identity-based attack detection in mobile wireless networks
Sort
View
AINA
2008
IEEE
14 years 2 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 2 months ago
TCP HandOff: A Practical TCP Enhancement for Heterogeneous Mobile Environments
— In recent years, many different kinds of wireless access networks have been deployed for the Internet and have become inseparable parts of the Internet. But TCP, the most widel...
Xiuchao Wu, Mun Choon Chan, Akkihebbal L. Ananda
AUTONOMICS
2008
ACM
13 years 9 months ago
Design of a fence surveillance system based on wireless sensor networks
In this paper, we present a real application system based on wireless sensor network (WSN) for fence surveillance which is implemented on our development platform for WSN, called ...
Youngsoo Kim, Jonggu Kang, Daeyoung Kim, Eunjo Kim...
ICICS
2003
Springer
14 years 27 days ago
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
Abstract. For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing ...
Yan Wang 0002, Chi-Hung Chi, Tieyan Li
WICOMM
2002
121views more  WICOMM 2002»
13 years 7 months ago
Open issues on TCP for mobile computing
We discuss the design principles of TCP within the context of heterogeneous wired/wireless networks and mobile networking. We identify three shortcomings in TCP's behavior: (...
Vassilios Tsaoussidis, Ibrahim Matta