Sciweavers

258 search results - page 16 / 52
» Security performance of loaded IEEE 802.11b wireless network...
Sort
View
WS
2004
ACM
15 years 5 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
15 years 6 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
SUTC
2006
IEEE
15 years 5 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICDCS
2008
IEEE
15 years 6 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...
LCN
1999
IEEE
15 years 4 months ago
Periodic Route Optimization for Handed-Off Connections in Wireless ATM Networks
In Wireless ATM networks, user connections need to be rerouted during handoff as mobile users move among base stations. The rerouting of connections must be done quickly with mini...
Khaled Salah, Elias Drakopoulos, Tzilla Elrad