Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Abstract To mitigate the damaging impacts caused by interference and hidden terminals, it has been proposed to use orthogonal channels in wireless multi-hop mesh networks. We demon...
Tianji Li, Douglas J. Leith, Venkataramana Badarla...
In mobile ad hoc networks (MANETs), multi-hop message relay is the common way for nodes to communicate and participate in network operations, making routing a primary issue. The e...
Xu Li, Amiya Nayak, Isabelle Ryl, David Simplot, I...