Sciweavers

1692 search results - page 246 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
15 years 10 hour ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
ICNP
2007
IEEE
15 years 6 months ago
Scheduled PSM for Minimizing Energy in Wireless LANs
Power conservation is a general concern for mobile computing and communication. In this paper, we investigate the performance of the current 802.11 power saving mechanism (unschedu...
Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang
ICRA
2007
IEEE
138views Robotics» more  ICRA 2007»
15 years 6 months ago
Adaptive Embedded Roadmaps For Sensor Networks
Abstract— In this paper, we propose a new approach to wireless sensor network assisted navigation while avoiding moving dangers. Our approach relies on an embedded roadmap in the...
Gazihan Alankus, Nuzhet Atay, Chenyang Lu, O. Bur&...