Sciweavers

1692 search results - page 281 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
GLOBECOM
2008
IEEE
15 years 6 months ago
Collusion-Resistant Multi-Winner Spectrum Auction for Cognitive Radio Networks
—In order to fully utilize spectrum, auction-based dynamic spectrum allocation has become a promising approach which allows unlicensed wireless users to lease unused bands from s...
Yongle Wu, Beibei Wang, K. J. Ray Liu, T. Charles ...
IEEESP
2006
130views more  IEEESP 2006»
14 years 11 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
SENSYS
2004
ACM
15 years 5 months ago
The flooding time synchronization protocol
Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. Thi...
Miklós Maróti, Branislav Kusy, Gyula...
MOBISYS
2008
ACM
15 years 11 months ago
SeeMon: scalable and energy-efficient context monitoring framework for sensor-rich mobile environments
Proactively providing services to mobile individuals is essential for emerging ubiquitous applications. The major challenge in providing users with proactive services lies in cont...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Hyonik Le...
MOBIHOC
2005
ACM
15 years 11 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...