Sciweavers

1758 search results - page 144 / 352
» Energy-Efficient Communication Protocol for Wireless Microse...
Sort
View
WISEC
2010
ACM
15 years 5 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
15 years 6 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
MOBIQUITOUS
2007
IEEE
15 years 11 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
ICNP
2003
IEEE
15 years 10 months ago
Distributed, Self-Stabilizing Placement of Replicated Resources in Emerging Networks
Emerging large scale distributed networking systems, such as P2P file sharing systems, sensor networks, and ad hoc wireless networks, require replication of content, functionalit...
Bong-Jun Ko, Dan Rubenstein
GLOBECOM
2007
IEEE
15 years 11 months ago
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks
Many of the routing protocols that have been designed for wireless ad-hoc networks focus on energy-efficiency and guaranteeing high throughput in a non-adversarial setting. Howev...
Tanya Roosta, Sameer Pai, Phoebus Chen, Shankar Sa...