Sciweavers

1677 search results - page 290 / 336
» A distributed security scheme for ad hoc networks
Sort
View
ICNP
2000
IEEE
15 years 2 months ago
Dynamic Internet Overlay Deployment and Management Using the X-Bone
The X-Bone dynamically deploys and manages Internet overlays to reduce con®guration e€ort and increase network component sharing. The X-Bone discovers, con®gures, and monitors ...
Joseph D. Touch
INFOCOM
2007
IEEE
15 years 4 months ago
Geographic Routing Using Hyperbolic Space
Abstract— We propose a scalable and reliable point-topoint routing algorithm for ad hoc wireless networks and sensornets. Our algorithm assigns to each node of the network a virt...
Robert Kleinberg
ICPADS
2002
IEEE
15 years 2 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
IPPS
2006
IEEE
15 years 3 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
CCGRID
2006
IEEE
15 years 3 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...