In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
—Unlike in a wired network, a packet transmitted by a node in an ad hoc wireless network can reach all neighbors. Therefore, the total number of transmissions (forward nodes) is ...
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Set...