Sciweavers

26 search results - page 4 / 6
» mobiquitous 2005
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 4 months ago
Decentralizing Query Processing in Sensor Networks
Recent research has led to the advent of software systems capable of performing query processing in sensor networks. They perform query processing in a sensor network by construct...
Ross Rosemark, Wang-Chien Lee
MOBIQUITOUS
2005
IEEE
14 years 4 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
MOBIQUITOUS
2005
IEEE
14 years 4 months ago
Correlation Analysis for Alleviating Effects of Inserted Data in Wireless Sensor Networks
This paper introduces a new approach that addresses data contamination problems from attacks in unattended wireless sensor networks. We propose a sliding-window based spatio-tempo...
Sapon Tanachaiwiwat, Ahmed Helmy
MOBIQUITOUS
2005
IEEE
14 years 4 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
MOBIQUITOUS
2005
IEEE
14 years 4 months ago
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...
Yongjin Kim, Ahmed Helmy