Sciweavers

86 search results - page 13 / 18
» Jamming and sensing of encrypted wireless ad hoc networks
Sort
View
IWCMC
2006
ACM
15 years 3 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
COMCOM
2007
103views more  COMCOM 2007»
14 years 9 months ago
Using event detection latency to evaluate the coverage of a wireless sensor network
A wireless sensor network (WSN) consists of many tiny and low-power devices deployed in a sensing field. One of the major tasks of a WSN is to monitor the surrounding environment...
You-Chiun Wang, Kai-Yang Cheng, Yu-Chee Tseng
88
Voted
ICN
2005
Springer
15 years 3 months ago
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
Adrian Carlos Ferreira, Marcos Aurélio Vila...
WSNA
2003
ACM
15 years 2 months ago
The coverage problem in a wireless sensor network
One fundamental issue in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this pr...
Chi-Fu Huang, Yu-Chee Tseng
77
Voted
INFOCOM
2007
IEEE
15 years 4 months ago
Broadcast Flooding Revisited: Survivability and Latency
—This paper addresses the dynamics of broadcast flooding in random wireless ad hoc networks. In particular, we study the subset of nodes covered by a flood as well as timing is...
Petteri Mannersalo, Alireza Keshavarz-Haddad, Rudo...