Sciweavers

500 search results - page 95 / 100
» Securing Topology Maintenance Protocols for Sensor Networks
Sort
View
JSAC
2006
156views more  JSAC 2006»
13 years 7 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
IPSN
2009
Springer
14 years 2 months ago
Poster abstract: Enabling reliable and high-fidelity data center sensing
bstract: Enabling Reliable and High-Fidelity Data Center Sensing Chieh-Jan Mike Liang† , Jie Liu‡ , Liqian Luo , Andreas Terzis† † Johns Hopkins University ‡ Microsoft Re...
Chieh-Jan Mike Liang, Jie Liu, Liqian Luo, Andreas...
JNW
2008
144views more  JNW 2008»
13 years 7 months ago
Low-Latency Geographic Routing for Asynchronous Energy-Harvesting WSNs
Research on data routing strategies for wireless sensor networks (WSNs) has largely focused on energy efficiency. However rapid advances in WSNs require routing protocols which can...
Donggeon Noh, Ikjune Yoon, Heonshik Shin
LISA
2003
13 years 9 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
SUTC
2006
IEEE
14 years 1 months ago
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
Ing-Ray Chen, Jin-Hee Cho, Ding-Chau Wang