Sciweavers

291 search results - page 46 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
TIFS
2008
208views more  TIFS 2008»
15 years 1 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
VTC
2006
IEEE
113views Communications» more  VTC 2006»
15 years 8 months ago
Implementation of a Multihoming Agent for Mobile On-board Communication
— A research topic that is becoming increasingly popular is that of on-board mobile communication, where users on a vehicle are connected to a local network that attaches to the ...
Jun Yao, Yi Duan, Jianyu Pan, Kun-Chan Lan
ALGOSENSORS
2007
Springer
15 years 6 months ago
Efficient Sensor Network Design for Continuous Monitoring of Moving Objects
We study the problem of localizing and tracking multiple moving targets in wireless sensor networks, from a network design perspective i.e. towards estimating the least possible n...
Sotiris E. Nikoletseas, Paul G. Spirakis
ADHOC
2007
144views more  ADHOC 2007»
15 years 2 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
CORR
2006
Springer
206views Education» more  CORR 2006»
15 years 2 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski