Sciweavers

4189 search results - page 719 / 838
» On the Security of Wireless Sensor Networks
Sort
View
SENSYS
2004
ACM
15 years 3 months ago
The flooding time synchronization protocol
Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. Thi...
Miklós Maróti, Branislav Kusy, Gyula...
PERCOM
2006
ACM
15 years 9 months ago
Dependability and Accountability for Context-aware Middleware Systems
In this paper we present a framework to provide dependability through accountability. Our proposal exploits the asymmetry present in the majority of sensor data processing to chea...
Andrew C. Rice, Alastair R. Beresford
FGCN
2007
IEEE
164views Communications» more  FGCN 2007»
14 years 11 months ago
Future Application Scenarios for MANET-Based Intelligent Transportation Systems
Road transportation systems are traditionally characterized by how efficient they direct traffic in a non-congested manner towards their destinations. Improvement in car electroni...
Chai-Keong Toh
ICCSA
2010
Springer
15 years 4 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
ESAS
2007
Springer
15 years 4 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...