Sciweavers

1558 search results - page 255 / 312
» Mobility helps security in ad hoc networks
Sort
View
FIW
2003
120views Communications» more  FIW 2003»
15 years 1 months ago
A Policy Architecture for Enhancing and Controlling Features
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec, Kenneth J. Turner
GLOBECOM
2010
IEEE
14 years 10 months ago
Risk-Aware Response for Mitigating MANET Routing Attacks
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received co...
Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu
MIDDLEWARE
2005
Springer
15 years 5 months ago
Middleware for protocol-based coordination in dynamic networks
Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
ISORC
2007
IEEE
15 years 6 months ago
Data Dissemination for Wireless Sensor Networks
Due to the special characteristics (limited battery power, limited computing capability, low bandwidth, need to collect sensor data from multiple fixed-location source nodes to a...
Min-Gu Lee, Sunggu Lee
ACSAC
1998
IEEE
15 years 4 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu