Sciweavers

4189 search results - page 679 / 838
» On the Security of Wireless Sensor Networks
Sort
View
ADHOC
2007
144views more  ADHOC 2007»
14 years 10 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
81
Voted
CN
2006
127views more  CN 2006»
14 years 10 months ago
A survey on communication networks for electric system automation
In today' s competitive electric utility marketplace, real-time information becomes the key factor for reliable delivery of power to the end-users, profitability of the electr...
Vehbi C. Gungor, Frank C. Lambert
COMCOM
2010
129views more  COMCOM 2010»
14 years 10 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
148
Voted
SCN
2008
Springer
147views Communications» more  SCN 2008»
14 years 10 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
NAS
2010
IEEE
14 years 8 months ago
A Probabilistic Routing Protocol for Heterogeneous Sensor Networks
The past five years witnessed a rapid development in wireless sensor networks, which have been widely used in military and civilian applications. Due to different requirements in t...
Yuefei Hu, Wenzhong Li, Xiao Chen, Xin Chen, Sangl...