Sciweavers

7587 search results - page 197 / 1518
» Network Analysis and Visualisation
Sort
View
PERCOM
2005
ACM
16 years 4 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
124
Voted
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
15 years 11 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
ICASSP
2008
IEEE
15 years 11 months ago
Throughput analysis of wireless mesh networks
Wireless mesh networks are rapidly deployable for many applications. The throughput of such a network depends on the schemes used for medium access control. In this paper, we pres...
Yuan Yu, Yi Huang, Bin Zhao, Yingbo Hua
180
Voted
GLOBECOM
2006
IEEE
15 years 11 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
IFIP
2003
Springer
15 years 10 months ago
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case
In multi-hop wireless networks, every node is expected to forward packets for the benefit of other nodes. Yet, if each node is its own authority, then it may selfishly deny packe...
Márk Félegyházi, Levente Butt...