Sciweavers

1116 search results - page 130 / 224
» Packet combining in sensor networks
Sort
View
DCOSS
2006
Springer
15 years 3 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
MSN
2007
Springer
124views Sensor Networks» more  MSN 2007»
15 years 5 months ago
Reducing End-to-End Delay in Multi-path Routing Algorithms for Mobile Ad Hoc Networks
Some of the routing algorithms in mobile ad hoc networks use multiple paths simultaneously. These algorithms can attempt to find nodedisjoint paths to achieve higher fault toleranc...
Nastooh Taheri Javan, Mehdi Dehghan
MSN
2007
Springer
160views Sensor Networks» more  MSN 2007»
15 years 5 months ago
Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks
The access scheduling on the control channels in TDMA wireless mesh networks is studied in this paper. The problem is to assign time-slots for each node in the network to access th...
Hongju Cheng, Xiaohua Jia, Hai Liu
SP
2002
IEEE
14 years 11 months ago
Stateful Intrusion Detection for High-Speed Networks
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Christopher Krügel, Fredrik Valeur, Giovanni ...
WOWMOM
2005
ACM
165views Multimedia» more  WOWMOM 2005»
15 years 4 months ago
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
Recent work on key establishment for sensor networks has shown that it is feasible to employ limited Elliptic Curve Cryptography in sensor networks through hybrid protocols. In th...
Panayiotis Kotzanikolaou, Emmanouil Magkos, Christ...