Sciweavers

291 search results - page 34 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
WICON
2010
15 years 1 months ago
TRCCIT: Tunable Reliability with Congestion Control for Information Transport in Wireless Sensor Networks
A core functionality of Wireless Sensor Networks (WSNs) is to transport information from the network to the application/user. The evolvable application reliability requirements and...
Neeraj Suri, Faisal Karim Shaikh, Abdelmajid Kheli...
WISEC
2009
ACM
15 years 10 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
158
Voted
RTSS
2007
IEEE
15 years 10 months ago
FireFly Mosaic: A Vision-Enabled Wireless Sensor Networking System
— With the advent of CMOS cameras, it is now possible to make compact, cheap and low-power image sensors capable of on-board image processing. These embedded vision sensors provi...
Anthony Rowe, Dhiraj Goel, Raj Rajkumar
158
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
End-to-End Throughput-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks
— 1 Wireless mesh networks are deployed as broadband backbones to provide ubiquitous wireless access for residents and local businesses. Utilizing multiple channels has the poten...
Fei Ye, Qing Chen, Zhisheng Niu
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 4 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...