Sciweavers

SECON
2010
IEEE
13 years 9 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
SECON
2010
IEEE
13 years 9 months ago
Overcoming MAC Overhead Using Packet-Size Dependent Channel Widths
Vijay Raman, Fan Wu, Brian Proulx, Nitin H. Vaidya
SECON
2010
IEEE
13 years 9 months ago
Disruption-Tolerant Spatial Dissemination
Abstract-- Spatial dissemination is a specific form of information dissemination that enables mobile users to send information to other mobile users who are or will appear at a spe...
Bo Xing, Sharad Mehrotra, Nalini Venkatasubramania...
SECON
2010
IEEE
13 years 9 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das
SECON
2010
IEEE
13 years 9 months ago
Tones for Real: Managing Multipath in Underwater Acoustic Wakeup
The principles of sensor networks--low-power, wireless, in-situ sensing with many inexpensive sensors--are only recently penetrating into underwater research. Acoustic communicati...
Affan A. Syed, John S. Heidemann, Wei Ye
SECON
2010
IEEE
13 years 9 months ago
A Robust Push-To-Talk Service for Wireless Mesh Networks
Push-to-Talk (PTT) is a useful capability for rapidly deployable wireless mesh networks used by first responders. PTT allows several users to speak with each other while using a si...
Yair Amir, Raluca Musaloiu-Elefteri, Nilo Rivera
SECON
2010
IEEE
13 years 9 months ago
QoI-Aware Wireless Sensor Network Management for Dynamic Multi-Task Operations
Abstract--This paper considers the novel area of quality-ofinformation (QoI)-aware network management of multitasking wireless sensor networks (WSNs). Specifically, it provides an ...
Chi Harold Liu, Chatschik Bisdikian, Joel W. Branc...
SECON
2010
IEEE
13 years 9 months ago
Traffic Inference in Anonymous MANETs
Abstract--The open wireless medium in a mobile ad-hoc network (MANET) enables malicious traffic analysis to dynamically infer the network traffic pattern in hostile environments. T...
Yunzhong Liu, Rui Zhang, Jing Shi, Yanchao Zhang
SCN
2010
Springer
124views Communications» more  SCN 2010»
13 years 9 months ago
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
At Asiacrypt 2009, Kurosawa and Nojima showed a fully simulatable adaptive oblivious transfer (OT) protocol under the DDH assumption in the standard model. However, Green and Hohen...
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 9 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena