Sciweavers

2503 search results - page 248 / 501
» Building Computer Network Attacks
Sort
View
ICNP
2009
IEEE
15 years 8 months ago
Declarative Policy-based Adaptive MANET Routing
—This paper presents the design and implementation of declarative policy-based adaptive MANET routing protocols. Our work builds upon declarative networking, a recent innovation ...
Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwi...
INFOCOM
2008
IEEE
15 years 8 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
IPCCC
2005
IEEE
15 years 7 months ago
SECK: survivable and efficient clustered keying for wireless sensor networks
A wireless sensor network (WSN) typically consists of a large number of small sensor nodes and one or more highend control and data aggregation nodes. Sensor nodes have limited co...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
AMCS
2010
146views Mathematics» more  AMCS 2010»
15 years 2 months ago
Sensor network design for the estimation of spatially distributed processes
satisfactory network connectivity have dominated this line of research and abstracted away from the mathematical description of the physical processes underlying the observed pheno...
Dariusz Ucinski, Maciej Patan
IJNSEC
2008
132views more  IJNSEC 2008»
15 years 2 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller