Sciweavers

10044 search results - page 181 / 2009
» Authentication in Wireless Networks
Sort
View
153
Voted
BROADNETS
2006
IEEE
15 years 10 months ago
Coverage with Connectivity in Wireless Sensor Networks
— In this paper, we study coverage with connectivity properties in large wireless sensor networks. We consider three classes: full coverage with connectivity, partial coverage wi...
Xin Liu
IPCCC
2005
IEEE
15 years 9 months ago
Modeling and performance analysis of public safety wireless networks
Public safety wireless networks (PSWNs) play a vital role in the operation of emergency agencies. In this paper, we describe analysis and modeling of traffic data collected from E...
Jiaqing Song, Ljiljana Trajkovic
NETWORK
2006
190views more  NETWORK 2006»
15 years 4 months ago
A survey of transport protocols for wireless sensor networks
In this article we present a survey of transport protocols for Wireless Sensor Networks (WSNs). We first highlight several unique aspects of WSNs, and describe the basic design cr...
Chonggang Wang, Kazem Sohraby, Bo Li, Mahmoud Dane...
NETWORK
2011
14 years 11 months ago
Selective jamming/dropping insider attacks in wireless mesh networks
—Wireless mesh networks (WMNs) promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their unique archit...
Loukas Lazos, Marwan Krunz
FUIN
2007
99views more  FUIN 2007»
15 years 4 months ago
Verifying Security Protocols Modelled by Networks of Automata
In this paper we show a novel method for modelling behaviours of security protocols using networks of communicating automata in order to verify them with SAT-based bounded model ch...
Miroslaw Kurkowski, Wojciech Penczek