Sciweavers

1463 search results - page 262 / 293
» Securing Wireless Mesh Networks
Sort
View
INFOCOM
2006
IEEE
14 years 3 months ago
Nomadic Service Points
— We consider the novel problem of dynamically assigning application sessions of mobile users or user groups to service points. Such assignments must balance the tradeoff between...
Edward Bortnikov, Israel Cidon, Idit Keidar
PE
2007
Springer
175views Optimization» more  PE 2007»
13 years 8 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
IWCMC
2006
ACM
14 years 3 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
MOBIHOC
2007
ACM
14 years 8 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
CCS
2008
ACM
13 years 11 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia