Sciweavers

6122 search results - page 40 / 1225
» Securing network access in wireless sensor networks
Sort
View
IJWIN
2006
209views more  IJWIN 2006»
13 years 7 months ago
On Connected Multiple Point Coverage in Wireless Sensor Networks
Abstract-- We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a s...
Shuhui Yang, Fei Dai, Mihaela Cardei, Jie Wu, Floy...
LCN
2007
IEEE
14 years 1 months ago
Distributed CDMA-based MAC Protocol for Underwater Sensor Networks
—Underwater Sensor Networks are typically distributed in nature and the nodes communicate using acoustic waves over a wireless medium. Such networks are characterized by long and...
Hwee Xian Tan, Winston Khoon Guan Seah
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
MSN
2007
Springer
187views Sensor Networks» more  MSN 2007»
14 years 1 months ago
Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks
Abstract. Multi-hop wireless networks provide a quick and easy way for networking when we need a temporary network or when cabling is difficult. The 802.11 Medium Access Control (M...
Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda