Sciweavers

3793 search results - page 754 / 759
» Securing Sensor Reports in Wireless Sensor Networks*
Sort
View
ADHOC
2007
122views more  ADHOC 2007»
13 years 6 months ago
Modeling and analyzing the correctness of geographic face routing under realistic conditions
Geographic protocols are very promising for wireless ad hoc and sensor networks due to the low state storage and low message overhead. Under certain idealized conditions, geograph...
Karim Seada, Ahmed Helmy, Ramesh Govindan
TCOM
2010
117views more  TCOM 2010»
13 years 5 months ago
Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty
Bidirectional relaying is a promising approach to improve the performance in wireless networks such as sensor, ad-hoc, and even cellular systems. Bidirectional relaying applies to...
Rafael F. Wyrembelski, Igor Bjelakovic, Tobias J. ...
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 3 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
ICDCS
2011
IEEE
12 years 6 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
MOBICOM
2010
ACM
13 years 7 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...