Sciweavers

258 search results - page 28 / 52
» Security performance of loaded IEEE 802.11b wireless network...
Sort
View
ICC
2009
IEEE
201views Communications» more  ICC 2009»
14 years 9 months ago
Analyzing Selfish Topology Control in Multi-Radio Multi-Channel Multi-Hop Wireless Networks
Typically, topology control is perceived as a per-node transmit power control process that achieves certain networklevel objectives. We take an alternative approach of controlling ...
Ramakant S. Komali, Allen B. MacKenzie
ICDCSW
2008
IEEE
15 years 6 months ago
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks
Reputation and Trust-based Monitoring Systems (RTMSs) have provided a ubiquitous framework for secure Wireless Sensor Network (WSN) computing. Employing sensors for neighborhood m...
Avinash Srinivasan, Feng Li, Jie Wu
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
15 years 6 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
15 years 6 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
INFOCOM
2006
IEEE
15 years 5 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya