Sciweavers

119 search results - page 13 / 24
» Secure Localization with Hidden and Mobile Base Stations
Sort
View
WMCSA
2008
IEEE
15 years 6 months ago
Distributed authentication for low-cost wireless networks
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the c...
Sridhar Machiraju, Hao Chen, Jean Bolot
92
Voted
WIMOB
2008
IEEE
15 years 6 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
113
Voted
CCS
2008
ACM
15 years 2 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
PIMRC
2008
IEEE
15 years 6 months ago
Downlink overhead reduction for Multi-Cell Cooperative Processing enabled wireless networks
—Multi-cell Cooperative Processing (MCP) has been recognised as an efficient technique for increasing spectral efficiency of future cellular systems. However the provided bene...
Agisilaos Papadogiannis, Hans Jørgen Bang, ...
AINA
2007
IEEE
15 years 6 months ago
How to Study Wireless Mesh Networks: A hybrid Testbed Approach
— Simulation is the most famous way to study wireless an mobile networks since they offer a convenient combination of flexibility and controllability. However, their largest dis...
Alexander Zimmermann, Mesut Günes, Martin Wen...