Sciweavers

1758 search results - page 110 / 352
» Energy-Efficient Communication Protocol for Wireless Microse...
Sort
View
ADHOCNOW
2006
Springer
15 years 8 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
ESAS
2006
Springer
15 years 5 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
ISCC
2005
IEEE
15 years 7 months ago
The Impact of Network and Protocol Heterogeneity on Real-Time Application QoS
We evaluate the impact of network, and protocol heterogeneity on real-time application performance. We focus on TCP and UDP supportive role, also in the context of network stabili...
Panagiotis Papadimitriou, Vassilis Tsaoussidis, So...
ICMCS
2008
IEEE
164views Multimedia» more  ICMCS 2008»
15 years 8 months ago
A comparative study of network transport protocols for in-vehicle media streaming
We analyze and compare various transport protocols in the context of wireless in-vehicle IP-based audio and video communication. We determine the most appropriate transport protoc...
Mehrnoush Rahmani, Andrea Pettiti, Ernst Biersack,...
INFOCOM
2003
IEEE
15 years 7 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson