Sciweavers

229 search results - page 40 / 46
» Security Analysis of Two Anonymous Authentication Protocols ...
Sort
View
ESAS
2004
Springer
14 years 1 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
GLOBECOM
2010
IEEE
13 years 5 months ago
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Duty cycling is often used to reduce the energy consumption caused by idle listening in Wireless Sensor Networks (WSNs). Most studies on WSN protocols define a common duty cycle va...
Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wen...
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 7 months ago
Outage Probability of General Ad Hoc Networks in the High-Reliability Regime
Outage probabilities in wireless networks depend on various factors: the node distribution, the MAC scheme, and the models for path loss, fading and transmission success. In prior ...
Riccardo Giacomelli, Radha Krishna Ganti, Martin H...
WISEC
2009
ACM
14 years 2 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
GLOBECOM
2008
IEEE
14 years 2 months ago
Distributed Spectrum Allocation of Delay-Sensitive Users over Multi-User Multi-Carrier Networks
—In this paper, we study the distributed spectrum allocation for autonomous users transmitting delay-sensitive information over a wireless multi-carrier network. Because there is...
Wenchi Tu, Mihaela van der Schaar