Sciweavers

4189 search results - page 762 / 838
» On the Security of Wireless Sensor Networks
Sort
View
ICDCS
2010
IEEE
15 years 1 months ago
Deployment of a Reinforcement Backbone Network with Constraints of Connection and Resources
In recent years, we have seen a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multi-hop w...
Peng Wei, Shan Chu, Xin Wang, Yu Zhou
GLOBECOM
2007
IEEE
15 years 4 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
WONS
2012
IEEE
13 years 5 months ago
Challenges and implications of using ultrasonic communications in intra-body area networks
Abstract— Body area networks (BANs) promise to enable revolutionary biomedical applications by wirelessly interconnecting devices implanted or worn by humans. However, BAN wirele...
Laura Galluccio, Tommaso Melodia, Sergio Palazzo, ...
VTC
2007
IEEE
183views Communications» more  VTC 2007»
15 years 4 months ago
Multimedia over 802.15.4 and ZigBee Networks for Ambient Environment Control
—WPAN technologies such as IEEE 802.15.4 have been introduced to allow for energy-efficient communication of control and sensor data. In certain application areas, it is benefici...
Ralf Burda, Christian Wietfeld
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
15 years 4 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...