Sciweavers

2189 search results - page 418 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
SASN
2005
ACM
15 years 5 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
PERCOM
2005
ACM
15 years 11 months ago
Determination of Time and Order for Event-Based Middleware in Mobile Peer-to-Peer Environments
An event correlation is becoming an important service in event-based middleware allowing subscribers in publish/subscribe paradigm to consume patterns of events (composite events)...
Eiko Yoneki, Jean Bacon
ICICS
2004
Springer
15 years 5 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
MSWIM
2005
ACM
15 years 5 months ago
Randomized energy aware routing algorithms in mobile ad hoc networks
We consider the problem of energy aware localized routing in ad hoc networks. In localized routing algorithms, each node forwards a message based on the position information about...
Israat Tanzeena Haque, Chadi Assi, J. William Atwo...
DBISP2P
2004
Springer
131views Database» more  DBISP2P 2004»
15 years 5 months ago
Dissemination of Spatial-Temporal Information in Mobile Networks with Hotspots
In this paper we examine the dissemination of reports about resources in mobile networks with hotspots, where hotspots, vehicles and sensors communicate with each other via short-r...
Ouri Wolfson, Bo Xu, Huabei Yin