Sciweavers

87 search results - page 4 / 18
» Physical Security Perimeters for Wireless Local Area Network...
Sort
View
VTC
2006
IEEE
113views Communications» more  VTC 2006»
14 years 1 months ago
On the Practical Issues in Hop Count Localization of Sensors in a Multihop Network
– Simple algorithms have been developed in the area of node localization in a wireless sensor network. For these simple algorithms to work, several assumptions were made. However...
Eddie B. S. Tan, Joo Ghee Lim, Winston Khoon Guan ...
WCNC
2008
IEEE
14 years 1 months ago
Adaptive Tuning of MIMO-Enabled 802.11e WLANs with Network Utility Maximization
— The IEEE 802.11-based wireless local area networks (WLANs) are widely used for high-speed wireless data access. With the recent 802.11e quality-of-service (QoS) extension, real...
Yuxia Lin, Vincent W. S. Wong
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 7 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
TPHOL
2009
IEEE
14 years 2 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...