Sciweavers

28 search results - page 5 / 6
» Towards a theory for securing time synchronization in wirele...
Sort
View
MOBICOM
2004
ACM
13 years 11 months ago
Initializing newly deployed ad hoc and sensor networks
A newly deployed multi-hop radio network is unstructured and lacks a reliable and efficient communication scheme. In this paper, we take a step towards analyzing the problems exis...
Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer
INFOCOM
2010
IEEE
13 years 4 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
ESA
2006
Springer
140views Algorithms» more  ESA 2006»
13 years 9 months ago
Latency Constrained Aggregation in Sensor Networks
A sensor network consists of sensing devices which may exchange data through wireless communication. A particular feature of sensor networks is that they are highly energy constrai...
Luca Becchetti, Peter Korteweg, Alberto Marchetti-...
ICCCN
2008
IEEE
13 years 12 months ago
A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance
—Broadcast presents a special challenge for Wireless Sensor Networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must b...
Chien-Chun Ni, Tien-Ruey Hsiang, J. D. Tygar
ESAS
2004
Springer
13 years 11 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar