Sciweavers

60 search results - page 3 / 12
» Analyzing the energy consumption of security protocols
Sort
View
PERCOM
2010
ACM
13 years 3 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
ISVLSI
2008
IEEE
129views VLSI» more  ISVLSI 2008»
13 years 11 months ago
Smart-NICs: Power Proxying for Reduced Power Consumption in Network Edge Devices
The number of edge devices connected to the Internet is increasing at a rapid rate. To maintain network connectivity, the majority of these devices remain completely powered on wh...
Karthik Sabhanatarajan, Ann Gordon-Ross, Mark Oden...
COMCOM
2008
244views more  COMCOM 2008»
13 years 5 months ago
Energy analysis of routing protocols for underwater wireless sensor networks
Underwater wireless sensor networks consist of a certain number of sensors and vehicles that interact to collect data and perform collaborative tasks. Designing energy-efficient r...
Mari Carmen Domingo, Rui Prior
SENSYS
2003
ACM
13 years 10 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
ICASSP
2008
IEEE
13 years 11 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig