Sciweavers

1129 search results - page 119 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
MOBIHOC
2000
ACM
15 years 2 months ago
DEAPspace: transient ad-hoc networking of pervasive devices
The rapid spreading of mobile computerized devices marks the beginning of a new computing paradigm characterized by ad hoc networking and spontaneous interaction, taking place tra...
Reto Hermann, Dirk Husemann, Michael Moser, Michae...
ACSAC
2002
IEEE
15 years 3 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
COMCOM
2006
97views more  COMCOM 2006»
14 years 10 months ago
Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks
A number of routing protocols [1] have been proposed for wireless sensor networks in recent years. Considering energy-efficiency as the primary objective, most of routing protocol...
Min Chen, Taekyoung Kwon, Yanghee Choi
GLOBECOM
2008
IEEE
15 years 4 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
NDSS
2005
IEEE
15 years 3 months ago
The Internet Motion Sensor - A Distributed Blackhole Monitoring System
As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while necessary,...
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose ...