Sciweavers

405 search results - page 63 / 81
» Securing cognitive radio networks
Sort
View
ISCC
2003
IEEE
180views Communications» more  ISCC 2003»
14 years 2 months ago
Wireless Application Protocol Transport Layer Performance
: In this paper, simulation-based performance evaluation of the Wireless Application Protocol (WAP) Transport Lay er Protocol, which may be suitable for Combat Net Radio (CNR), is ...
Gökhan Kahraman, Semih Bilgen
CCS
2007
ACM
14 years 3 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
INFOCOM
2009
IEEE
14 years 3 months ago
Capabilities of Low-Power Wireless Jammers
— In this paper, motivated by the goal of modeling the fine-grain capabilities of jammers for the context of security in low-power wireless networks, we experimentally character...
Lifeng Sang, Anish Arora
SECON
2008
IEEE
14 years 3 months ago
Per User Throughput in Large Wireless Networks
— Previous results show that a node’s throughput scales poorly as the network size increases when every node has traffic. However, in many cases, only a fraction of nodes in l...
Dan Xu, Xin Liu
INFOCOM
2011
IEEE
13 years 19 days ago
Transport throughput of secondary networks in spectrum sharing systems
—Spectrum sharing systems such as cognitive radio networks have drawn much attention recently due to their potential to resolve the conflict between increasing demand for spectr...
Chengzhi Li, Huaiyu Dai