Sciweavers

1558 search results - page 294 / 312
» Mobility helps security in ad hoc networks
Sort
View
IJSN
2006
140views more  IJSN 2006»
14 years 9 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
ICC
2011
IEEE
257views Communications» more  ICC 2011»
13 years 9 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...
INFOCOM
2011
IEEE
14 years 1 months ago
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
Xiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin S...
NCA
2009
IEEE
15 years 4 months ago
Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET
Abstract— The Virtual Node Layer (VNLayer) is a programtraction for Mobile Ad Hoc Networks (MANETs). It defines simple virtual servers at fixed locations in a network, addressi...
Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvi...
LCN
2007
IEEE
15 years 4 months ago
Semi-Split TCP: Maintaining End-to-End Semantics for Split TCP
—It has long been acknowledged that TCP performance suffers in hybrid networks. A Split TCP approach has been proposed to address this problem. In this approach, a proxy is emplo...
Fei Xie, Ning Jiang, Yao Hua Ho, Kien A. Hua