Sciweavers

1631 search results - page 72 / 327
» Mobility Management
Sort
View
GLOBECOM
2007
IEEE
15 years 7 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
AINA
2008
IEEE
15 years 7 months ago
Intra Domain Route Optimization for Ubiquitous
The main advantage of a wireless network is user mobility, which calls for efficient routing support at the network layer. An architecture combines hierarchical mobile IPv6 and ne...
Hye-Young Kim, Young-Sik Jeong, Laurence Tianruo Y...
MATA
2004
Springer
199views Communications» more  MATA 2004»
15 years 6 months ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert
150
Voted
SIMUTOOLS
2008
15 years 2 months ago
An accurate and extensible mobile IPv6 (xMIPV6) simulation model for OMNeT++
MIPv6 is the IPv6 based mobility management protocol and it is expected to become the mobility management protocol of choice for the Next Generation Wireless Access Networks. In o...
Faqir Zarrar Yousaf, Christian Bauer, Christian Wi...
DAGSTUHL
2006
15 years 2 months ago
06431 Working Group Summary: Atomicity in Mobile Networks
We introduce different mobile network applications and show to which degree the concept of database transactions is required within the applications. We show properties of transact...
Sebastian Obermeier, Joos-Hendrik Böse, Stefa...