Sciweavers

172 search results - page 18 / 35
» ARMS: An Authenticated Routing Message in Sensor Networks
Sort
View
PAM
2007
Springer
15 years 5 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
AINA
2008
IEEE
15 years 6 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
WSC
2004
15 years 1 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
MSWIM
2005
ACM
15 years 5 months ago
Randomized energy aware routing algorithms in mobile ad hoc networks
We consider the problem of energy aware localized routing in ad hoc networks. In localized routing algorithms, each node forwards a message based on the position information about...
Israat Tanzeena Haque, Chadi Assi, J. William Atwo...
EWSN
2006
Springer
15 years 11 months ago
On the Scalability of Routing Integrated Time Synchronization
Time synchronization is a crucial component of a large class of sensor network applications, traditionally implemented as a standalone middleware service that provides a virtual gl...
János Sallai, Branislav Kusy, Ákos L...