Sciweavers

6122 search results - page 195 / 1225
» Securing network access in wireless sensor networks
Sort
View
GLOBECOM
2006
IEEE
15 years 10 months ago
Adaptive Network Resource Management in IEEE 802.11 Wireless Random Access MAC
— Effective and efficient management of wireless network resources is attracting more and more research attention, due to the rapid growing deployment of wireless mesh and ad hoc...
Hao Wang, Changcheng Huang, James Yan
TMC
2012
13 years 7 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
154
Voted
MOBICOM
2010
ACM
15 years 4 months ago
Stix: a goal-oriented distributed management system for large-scale broadband wireless access networks
Stix is a platform managing emerging large-scale broadband wireless access (BWA) networks. It has been developed to make it easy to manage such networks for community deployments ...
Giacomo Bernardi, Matt Calder, Damon Fenacci, Alex...
CONEXT
2006
ACM
15 years 10 months ago
Neighbor discovery analysis in wireless sensor networks
In wireless sensor networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic mo...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
SASN
2005
ACM
15 years 10 months ago
Coordinated sensor deployment for improving secure communications and sensing coverage
Sensor network has a great potential in applications such as habitat monitoring, wildlife tracking, building surveillance, and military combat. The design of a sensor network syst...
Yinian Mao, Min Wu