Sciweavers

571 search results - page 88 / 115
» Simulating Realistic Packet Routing without Routing Protocol...
Sort
View
100
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 6 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
111
Voted
COMCOM
2007
136views more  COMCOM 2007»
15 years 14 days ago
Demand-scalable geographic multicasting in wireless sensor networks
In this paper, we focus on the challenge of demand-scalable multicast routing in wireless sensor networks. Due to the ad-hoc nature of the placement of the sensor nodes as well as...
Shibo Wu, K. Selçuk Candan
139
Voted
CONEXT
2007
ACM
15 years 4 months ago
Rethinking internet traffic management: from multiple decompositions to a practical protocol
In the Internet today, traffic management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, th...
Jiayue He, Martin Suchara, Ma'ayan Bresler, Jennif...
122
Voted
ICWN
2003
15 years 1 months ago
Distributed Energy Aware MAC Layer Protocol for Wireless Sensor Networks
Due to the fact that sensor nodes are untethered and unattended, energy management is a critical issue in communication mechanism of a wireless sensor network. In this paper, we a...
Ramaraju Kalidindi, Rajgopal Kannan, S. Sitharama ...