Sciweavers

405 search results - page 69 / 81
» Securing cognitive radio networks
Sort
View
WISEC
2010
ACM
14 years 2 months ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
COMSWARE
2006
IEEE
14 years 3 months ago
Trust-propagation based authentication protocol in multihop wireless home networks
Abstract— In this paper, we propose an authentication and secure channel establishment protocol that is reliable and adaptable for multihop wireless home networks. The main idea ...
Han Sang Kim, Jin Wook Lee, Sandeep K. S. Gupta, Y...
TWC
2010
13 years 3 months ago
Bandwidth exchange: an energy conserving incentive mechanism for cooperation
Cooperative forwarding in wireless networks has shown to yield rate and diversity gains, but it incurs energy costs borne by the cooperating nodes. In this paper we consider an inc...
Dan Zhang, Ryoichi Shinkuma, Narayan B. Mandayam
IJSN
2010
148views more  IJSN 2010»
13 years 7 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
ICCSA
2005
Springer
14 years 2 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...