Sciweavers

1440 search results - page 16 / 288
» A protocol for packet network intercommunication
Sort
View
CONEXT
2008
ACM
15 years 1 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
INFOCOM
2003
IEEE
15 years 5 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
CORR
2010
Springer
167views Education» more  CORR 2010»
14 years 11 months ago
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet Forwarding Technique for Wireless Sensor and Ad Hoc
Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor ...
Kaushik Ghosh 0002, Sarbani Roy, Pradip K. Das
ITIIS
2010
140views more  ITIIS 2010»
14 years 6 months ago
RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
In Hur, Moonseong Kim, Jaewan Seo, Hyunseung Choo
97
Voted
INFOCOM
2007
IEEE
15 years 6 months ago
Packet Loss Characterization in WiFi-Based Long Distance Networks
— Despite the increasing number of WiFi-based Long Distance (WiLD) network deployments, there is a lack of understanding of how WiLD networks perform in practice. In this paper, ...
Anmol Sheth, Sergiu Nedevschi, Rabin K. Patra, Son...