Sciweavers

225 search results - page 41 / 45
» Inherent Security of Routing Protocols in Ad-Hoc and Sensor ...
Sort
View
AINA
2009
IEEE
14 years 2 months ago
Sector-Based Routing with Destination Location Prediction for Underwater Mobile Networks
Unlike in terrestrial sensor networks where the locations of destination nodes are often assumed to be fixed and accurately known, such assumptions are usually not valid in under...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
ACSAC
2006
IEEE
14 years 1 months ago
Secure Distributed Cluster Formation in Wireless Sensor Networks
In wireless sensor networks, clustering sensor nodes into small groups is an effective technique to achieve scalability, self-organization, power saving, channel access, routing, ...
Kun Sun, Pai Peng, Peng Ning, Cliff Wang
ALGOSENSORS
2007
Springer
13 years 9 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
CN
2007
117views more  CN 2007»
13 years 7 months ago
Cellular universal IP for nested network mobility
In recent years, network mobility (NEMO) has been studied extensively due to its potential applications in military and public transportation. NEMO basic support protocol (NBSP), ...
Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee
ACSC
2004
IEEE
13 years 11 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald