Sciweavers

366 search results - page 14 / 74
» Transmission costs, selfish nodes, and protocol design
Sort
View
CCS
2007
ACM
14 years 3 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
ICWN
2004
13 years 10 months ago
Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...
Souheila Bouam, Jalel Ben-Othman
ICC
2007
IEEE
112views Communications» more  ICC 2007»
14 years 3 months ago
A Collision-free Based Rotational Listening Strategy (RLS) for IEEE 802.15.4 WPAN
— The standard IEEE 802.15.4 medium access control (MAC) protocol is designed for low-power transmissions in low-rate and short-distance wireless personal area networks (WPANs). ...
Shiann-Tsong Sheu, Yun-Yen Shih
IPL
2008
72views more  IPL 2008»
13 years 9 months ago
Reducing communication costs in robust peer-to-peer networks
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robust to adversarial attack via Byzantine faults. Unfortunately, all of these resul...
Jared Saia, Maxwell Young
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 3 months ago
A Spreading Code MAC Protocol for Multi-Hop Wireless Ad Hoc Networks
— We propose a spreading code medium access control (MAC) protocol with each node equipped with single transceiver for wireless ad hoc networks, based on the code division multip...
Hang Su, Xi Zhang