Sciweavers

258 search results - page 40 / 52
» Security performance of loaded IEEE 802.11b wireless network...
Sort
View
VTC
2006
IEEE
113views Communications» more  VTC 2006»
14 years 1 months ago
Implementation of a Multihoming Agent for Mobile On-board Communication
— A research topic that is becoming increasingly popular is that of on-board mobile communication, where users on a vehicle are connected to a local network that attaches to the ...
Jun Yao, Yi Duan, Jianyu Pan, Kun-Chan Lan
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 1 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
BROADNETS
2007
IEEE
14 years 1 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy
INFOCOM
2008
IEEE
14 years 1 months ago
Snoogle: A Search Engine for the Physical World
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
Haodong Wang, Chiu Chiang Tan, Qun Li
ICNP
2006
IEEE
14 years 1 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...