Sciweavers

1466 search results - page 235 / 294
» Priority scheduling in wireless ad hoc networks
Sort
View
MONET
2002
142views more  MONET 2002»
13 years 8 months ago
Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...
Xianjun Geng, Yun Huang, Andrew B. Whinston
ICN
2005
Springer
14 years 2 months ago
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
Adrian Carlos Ferreira, Marcos Aurélio Vila...
CCS
2008
ACM
13 years 10 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
ICW
2005
IEEE
209views Communications» more  ICW 2005»
14 years 2 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...
JISE
2007
98views more  JISE 2007»
13 years 8 months ago
Integrated Buffer and Route Management in a DTN with Message Ferry
Unlike normal wireless ad hoc networks, end-to-end connection may not exist in DTNs Thus, the Message Ferrying (MF) scheme has been proposed as a strategy for providing connectivi...
Mooi Choo Chuah, Wenbin Ma