Sciweavers

391 search results - page 53 / 79
» Interference-Aware Robust Wireless Mesh Network Design
Sort
View
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
IPSN
2005
Springer
14 years 1 months ago
Telos: enabling ultra-low power wireless research
— We present Telos, an ultra low power wireless sensor module (“mote”) for research and experimentation. Telos is the latest in a line of motes developed by UC Berkeley to en...
Joseph Polastre, Robert Szewczyk, David E. Culler
SENSYS
2005
ACM
14 years 1 months ago
Z-MAC: a hybrid MAC for wireless sensor networks
This paper presents the design, implementation and performance evaluation of a hybrid MAC protocol, called Z-MAC, for wireless sensor networks that combines the strengths of TDMA ...
Injong Rhee, Ajit Warrier, Mahesh Aia, Jeongki Min
MOBICOM
2005
ACM
14 years 1 months ago
Self-management in chaotic wireless deployments
Over the past few years, wireless networking technologies have made vast forays into our daily lives. Today, one can find 802.11 hardware and other personal wireless technology e...
Aditya Akella, Glenn Judd, Srinivasan Seshan, Pete...
CACM
2008
84views more  CACM 2008»
13 years 7 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...