Sciweavers

6122 search results - page 135 / 1225
» Securing network access in wireless sensor networks
Sort
View
EWSN
2010
Springer
15 years 11 months ago
Exploiting Overlapping Channels for Minimum Power Configuration in Real-Time Sensor Networks
Xiaodong Wang, Xiaorui Wang, Guoliang Xing, Yanjun...
IEPOL
2010
107views more  IEPOL 2010»
15 years 2 months ago
On the convergence of wired and wireless access network architectures
Wired and wireless access networks continue to evolve toward higher-capacity, multi-service systems. Recent wireless broadband networks such as 3G LTE and WiMax provide a general-...
William H. Lehr, John M. Chapin
AUSFORENSICS
2003
15 years 5 months ago
Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A
Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat ...
Sue Webb
SECON
2010
IEEE
15 years 2 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...