Sciweavers

1463 search results - page 132 / 293
» Securing Wireless Mesh Networks
Sort
View
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
14 years 3 months ago
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks
— This paper presents a new notion of authenticating degraded multimedia content streamed over wireless networks – Unequal Authenticity Protection (UAP). Multimedia content dif...
Zhi Li, Qibin Sun, Yong Lian
GLOBECOM
2010
IEEE
13 years 7 months ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen
TMC
2010
138views more  TMC 2010»
13 years 7 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
ICASSP
2010
IEEE
13 years 9 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu