Sciweavers

510 search results - page 19 / 102
» Security issues in control, management and routing protocols
Sort
View
PERCOM
2010
ACM
13 years 6 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
INFOCOM
2007
IEEE
14 years 2 months ago
Joint Multi-Channel Link Layer and Multi-Path Routing Design for Wireless Mesh Networks
— In recent years, the wireless mesh network (WMN) attracts the interest of many people as a new broadband Internet access technology. However, increasing throughput is still an ...
Wai-Hong Tam, Yu-Chee Tseng
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
14 years 1 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
INFOCOM
2003
IEEE
14 years 1 months ago
Optimizing Route-Cache Lifetime in Ad Hoc Networks
—On-demand routing reduces the control overhead in mobile ad hoc networks, but it has the major drawback of introducing latency between route-request arrival and the determinatio...
Ben Liang, Zygmunt J. Haas
AAMAS
2004
Springer
13 years 7 months ago
MARP: A Multi-Agent Routing Protocol for Mobile Wireless Ad Hoc Networks
ACT Supporting mobility in a multi hop wireless environment like the MANET still remains a point of research, especially in the context of time-constrained applications. The incapa...
Romit Roy Choudhury, Krishna Paul, Somprakash Band...