Sciweavers

1463 search results - page 114 / 293
» Securing Wireless Mesh Networks
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
A Measurement Study of Multiplicative Overhead Effects in Wireless Networks
—In this paper, we perform an extensive measurement study on a multi-tier mesh network serving 4,000 users. Such dense mesh deployments have high levels of interaction across het...
Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, Edwa...
CCS
2008
ACM
13 years 11 months ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...
SUTC
2006
IEEE
14 years 3 months ago
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have ...
Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, ...
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 9 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
PERCOM
2003
ACM
14 years 8 months ago
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery...
Feng Zhu, Matt W. Mutka, Lionel M. Ni