Sciweavers

1463 search results - page 237 / 293
» Securing Wireless Mesh Networks
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
ADHOCNOW
2010
Springer
13 years 11 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
ADHOC
2007
109views more  ADHOC 2007»
13 years 10 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
ICDCS
2010
IEEE
14 years 1 months ago
Deployment of a Reinforcement Backbone Network with Constraints of Connection and Resources
In recent years, we have seen a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multi-hop w...
Peng Wei, Shan Chu, Xin Wang, Yu Zhou
PERCOM
2010
ACM
13 years 8 months ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang