Sciweavers

369 search results - page 26 / 74
» Reducing Security Overhead for Mobile Networks
Sort
View
135
Voted
IADIS
2003
15 years 3 months ago
A Mobile Agent Based Registration System
A mobile agent is a software agent that has the ability to transfer its program code, data and execution state across a network to a remote computer for execution. In this paper, ...
K. K. Wong, C. K. Heng, P. C. Leong, Ma-Tit Yap
IPCCC
2005
IEEE
15 years 7 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi
157
Voted
WIMOB
2007
IEEE
15 years 8 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
ADHOC
2008
132views more  ADHOC 2008»
15 years 2 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
ISPA
2004
Springer
15 years 7 months ago
An Enhanced Message Exchange Mechanism in Cluster-Based Mobile Ad Hoc Networks
Abstract. In mobile ad hoc networks (MANETs), networks can be partitioned into clusters. Clustering algorithms are localized algorithms that have the property of creating an upper ...
Wei Lou, Jie Wu