Sciweavers

3009 search results - page 8 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
WSNA
2003
ACM
14 years 21 days ago
Role-based hierarchical self organization for wireless ad hoc sensor networks
Efficiently self organizing a network hierarchy with specific assignment of roles (or tasks) to sensors based on their physical wireless connectivity and sensing characteristics ...
Manish Kochhal, Loren Schwiebert, Sandeep K. S. Gu...
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 7 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
25
Voted
NEW2AN
2007
Springer
14 years 1 months ago
tinyLUNAR: One-Byte Multihop Communications Through Hybrid Routing in Wireless Sensor Networks
Abstract. In this paper we consider a problem of implementing a hybrid routing protocol for wireless sensor networks, which natively supports data-centric, geographic-based and add...
Evgeny Osipov
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ADHOCNETS
2009
Springer
14 years 2 months ago
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks
Experiments with wireless sensor networks have shown that unidirectional communication links are quite common. What is even more, they have also shown that the range of a unidirect...
David Peters, Reinhardt Karnapke, Jörg Nolte