Sciweavers

793 search results - page 10 / 159
» Specknets: New Challenges for Wireless Communication Protoco...
Sort
View
SIGCOMM
1995
ACM
15 years 1 months ago
Authentication Protocols for Personal Communication Systems
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Hung-Yu Lin, Lein Harn
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks
– Hybrid Wireless Mesh Networks are wireless multi-hop networks consisting of two types of nodes, Mesh Routers and Mesh Clients. Mesh Routers are more static and less resource co...
Asad Amir Pirzada, Marius Portmann
COMPSAC
2003
IEEE
15 years 3 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
WIMOB
2007
IEEE
15 years 4 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
CSREAPSC
2006
14 years 11 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal