Sciweavers

291 search results - page 30 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
SENSYS
2005
ACM
15 years 9 months ago
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
— In this paper, we propose a dynamic en-route filtering scheme for false data injection attacks in wireless sensor networks. In sensor networks, adversaries can inject false da...
Zhen Yu, Yong Guan
WINET
2010
113views more  WINET 2010»
15 years 2 months ago
Designing multihop wireless backhaul networks with delay guarantees
— As wireless access technologies improve in data rates, the problem focus is shifting towards providing adequate backhaul from the wireless access points to the Internet. Existi...
Girija J. Narlikar, Gordon T. Wilfong, Lisa Zhang
142
Voted
ICMCS
2005
IEEE
177views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Centralized Peer-to-Peer Video Streaming Over Hybrid Wireless Network
Video streaming over wireless network has drawn a great interest. In traditional wireless local area networks (WLANs), when the number of the users and the number of the flows inc...
Yifeng He, Ivan Lee, Xijia Gu, Ling Guan
141
Voted
ARESEC
2011
119views more  ARESEC 2011»
14 years 4 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
131
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...