Sciweavers

1862 search results - page 344 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
ICCCN
2008
IEEE
15 years 5 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
WIOPT
2006
IEEE
15 years 5 months ago
Analyzing the impact of neighbor sensing on the performance of the OLSR protocol
— This paper presents an analysis of several neighbor sensing approaches for the OLSR routing protocol. While several performance studies of OLSR proceed this work, few attention...
Michael Voorhaen, Chris Blondia
ICPPW
2003
IEEE
15 years 4 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...
WIMOB
2007
IEEE
15 years 5 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...
TMC
2010
104views more  TMC 2010»
14 years 9 months ago
On Nodal Encounter Patterns in Wireless LAN Traces
—In this paper we analyze multiple wireless LAN (WLAN) traces from university and corporate campuses. In particular, we consider an important event between mobile nodes in wirele...
Wei-jen Hsu, Ahmed Helmy