Sciweavers

6122 search results - page 100 / 1225
» Securing network access in wireless sensor networks
Sort
View
PERCOM
2005
ACM
16 years 3 months ago
TinyLIME: Bridging Mobile and Sensor Networks through Middleware
In the rapidly developing field of sensor networks, bridging the gap between the applications and the hardware presents a major challenge. Although middleware is one solution, it ...
Carlo Curino, Matteo Giani, Marco Giorgetta, Aless...
TMC
2012
13 years 6 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
141
Voted
TWC
2008
186views more  TWC 2008»
15 years 4 months ago
SLAB: A secure localized authentication and billing scheme for wireless mesh networks
Abstract--The future metropolitan-area wireless mesh networks (WMNs) are expected to contain compromise-prone Mesh Access Points (MAPs) with a high frequency of inter-domain roamin...
Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho,...
ADHOCNOW
2010
Springer
15 years 5 months ago
On Alarm Protocol in Wireless Sensor Networks
We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication ch...
Jacek Cichon, Rafal Kapelko, Jakub Lemiesz, Marcin...
IJSNET
2006
145views more  IJSNET 2006»
15 years 4 months ago
RL-MAC: a reinforcement learning based MAC protocol for wireless sensor networks
:This paper introduces RL-MAC, a novel adaptive MediaAccess Control (MAC) protocol for Wireless Sensor Networks (WSN) that employs a reinforcement learning framework. Existing sche...
Zhenzhen Liu, Itamar Elhanany