195
Voted
DSN
15 years 10 months ago
2005 IEEE
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
151
click to vote
DSN
15 years 10 months ago
2005 IEEE
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
144
click to vote
DSN
15 years 10 months ago
2005 IEEE
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
140
Voted
DSN
15 years 10 months ago
2005 IEEE
Designing a distributed fault tolerance algorithm requires careful analysis of both fault models and diagnosis strategies. A system will fail if there are too many active faults, ...
184
Voted
DSN
15 years 7 months ago
2005 IEEE
The behavior of large-scale wireless sensor networks has been shown to be surprisingly complex and difficult to analyze, both by empirical experiment and simulation. In this pape...
|