Sciweavers

745 search results - page 89 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 3 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
VTC
2007
IEEE
14 years 3 months ago
Time-Stable Geocast in Intermittently Connected IEEE 802.11 MANETs
— By geocast protocols, information can be directly disseminated to users of mobile devices who currently reside in selected geographical regions. Time-stable geocast protocols e...
Sven D. Hermann, C. Michl, Adam Wolisz
GLOBECOM
2008
IEEE
14 years 3 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
ADHOCNOW
2005
Springer
14 years 2 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
FI
2010
175views more  FI 2010»
13 years 6 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao