Abstract In this paper, an agent based WLAN/cellular network integrated service model and relevant authentication scheme is proposed. The service model, or solution, does not r...
Minghui Shi, Humphrey Rutagemwa, Xuemin Shen, Jon ...
— In Hierarchical Mobile IPv6(HMIPv6) networks, the system performance is critically affected by the selection of Mobile Anchor Points(MAPs) and its load status. Thus, in this pa...
—Recently, game theory becomes a useful and powerful tool to research mobile ad hoc networks (MANETs). Wireless LANs (WLANs) can work under both infrastructure and ad hoc modes, ...
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
— An important element of any routing protocol used for Wireless Mesh Networks (WMNs) is the link cost function used to represent the radio link characteristic. The majority of t...
— The potential problem of oversubscribing receivers in receiver-driven multicast is addressed. We present a framework based on harmonizing the erasure-resilience properties of v...
By analyzing a two-month trace of more than 25 million emails received at a large US university campus network, of which more than 18 million are spam messages, we characterize th...
—The IEEE 802.22 standard for wireless regional area network is the first standard for cognitive radio that tries to harness the idle or under-utilized spectrum allocated for TV...