Sciweavers

430 search results - page 68 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
SAMOS
2007
Springer
14 years 2 months ago
k  +   Neigh : An Energy Efficient Topology Control for Wireless Sensor Networks
For most applications in wireless sensor networks (WSNs), it is often assumed that the deployment of sensor nodes is unmanaged and random, so the density of local node may vary thr...
Dong-Min Son, Young-Bae Ko
INFOCOM
2005
IEEE
14 years 1 months ago
MiNT: a miniaturized network testbed for mobile wireless research
— Most mobile wireless networking research today relies on simulations. However, fidelity of simulation results has always been a concern, especially when the protocols being st...
Pradipta De, Ashish Raniwala, Srikant Sharma, Tzi-...
WMASH
2004
ACM
14 years 1 months ago
Smart edge server: beyond a wireless access point
Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media ...
Geetha Manjunath, Tajana Simunic, Venkatesh Krishn...
COMCOM
2008
91views more  COMCOM 2008»
13 years 8 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
INFOCOM
2005
IEEE
14 years 1 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...