Sciweavers

761 search results - page 94 / 153
» Security Aspects of Mobile Communications
Sort
View
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 10 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 3 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
AMS
2007
Springer
281views Robotics» more  AMS 2007»
14 years 3 months ago
A Mobile Service Robot for Life Science Laboratories
Abstract. In this paper we presents a project that is developing a mobile service robot to assist users in biological and pharmaceutical laboratories by executing routine jobs such...
Erik Schulenburg, Norbert Elkmann, Markus Fritzsch...
ISER
1993
Springer
123views Robotics» more  ISER 1993»
14 years 1 months ago
Mobile Robot Miniaturisation: A Tool for Investigation in Control Algorithms
The interaction of an autonomous mobile robot with the real world critically depends on the robots morphology and on its environment. Building a model of these aspects is extremel...
Francesco Mondada, Edoardo Franzi, Paolo Ienne
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 3 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen