Sciweavers

1807 search results - page 66 / 362
» Resilient Overlay Networks
Sort
View
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 7 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
INFOCOM
2006
IEEE
14 years 1 months ago
Capacity-Constrained Design of Resilient Multi-Tier Wireless Mesh Networks
nts etc.), an abstract graph of the deployment area and QoS constraints to generate appropriate logical topologies. WIND starts with the set of network elements to be deployed (Nod...
R. Raghuraman, Sridhar Iyer
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
ICICS
2010
Springer
13 years 5 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
INFOCOM
2007
IEEE
14 years 2 months ago
Analysis of A Loss-Resilient Proactive Data Transmission Protocol in Wireless Sensor Networks
Abstract— Many of sensor network applications require reliable data communication such that data packets can be delivered to the destination without loss. However, existing relia...
Yingqi Xu, Wang-Chien Lee, Jianliang Xu