Sciweavers

256 search results - page 3 / 52
» Security protocols for 2G and 3G wireless communications
Sort
View
MOBIWAC
2009
ACM
14 years 5 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
INFOCOM
2010
IEEE
13 years 9 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
SAC
2009
ACM
14 years 5 months ago
Geographical data collection in sensor networks with self-organizing transaction cluster-heads
This paper proposes 2G, a flexible and energy-efficient data collection protocol for sensor networks for increasing network lifetime. To this end, it integrates self-organizing d...
Neeraj Rajgure, Eric Platon, Cristian Borcea, Shin...
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 5 months ago
Network Coding Based Cooperative Peer-to-Peer Repair in Wireless Ad-Hoc Networks
— Cooperative Peer-to-Peer Repair (CPR) has been proposed to recover from packet losses incurred during 3G broadcast. CPR leverages the increasing presence of multi-homed mobile ...
Xin Liu, Saqib Raza, Chen-Nee Chuah, Gene Cheung
ICN
2005
Springer
14 years 4 months ago
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
Adrian Carlos Ferreira, Marcos Aurélio Vila...