Sciweavers

2099 search results - page 137 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
GLOBECOM
2006
IEEE
14 years 3 months ago
Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks
— In order to fully exploit the aggregate bandwidth available in the radio spectrum, future Wireless Mesh Networks (WMN) are expected to take advantage of multiple orthogonal cha...
Anjum Naveed, Salil S. Kanhere
ICPPW
2005
IEEE
14 years 2 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
GLOBECOM
2010
IEEE
13 years 7 months ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen
SENSYS
2003
ACM
14 years 2 months ago
Bandwidth management in wireless sensor networks
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
TITB
2010
129views Education» more  TITB 2010»
13 years 4 months ago
iCalm: wearable sensor and network architecture for wirelessly communicating and logging autonomic activity
Widespread use of affective sensing in healthcare applications has been limited due to several practical factors such as lack of comfortable wearable sensors, lack of wireless stan...
Richard Ribon Fletcher, Kelly Dobson, Matthew S. G...