Sciweavers

97 search results - page 5 / 20
» Resiliency of Network Topologies under Path-Based Attacks
Sort
View
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 1 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon
ICC
2007
IEEE
14 years 1 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
ICC
2007
IEEE
14 years 1 months ago
Weighted Fairness in Resilient Packet Rings
— The IEEE 802.17 is a standardized ring topology network architecture, called the Resilient Packet Ring (RPR), to be used mainly in metropolitan and wide area networks. This pap...
Mete Yilmaz, Nirwan Ansari
INFOCOM
2009
IEEE
14 years 2 months ago
Topology Formation for Wireless Mesh Network Planning
—Wireless mesh networks are becoming prevalent in providing access infrastructure to the public. Design of such networks involve several important goals including resilience to f...
Chun-cheng Chen, Chandra Chekuri, D. Klabjan
ICICS
2010
Springer
13 years 5 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao