Sciweavers

793 search results - page 41 / 159
» Specknets: New Challenges for Wireless Communication Protoco...
Sort
View
CCS
2009
ACM
15 years 10 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
IJSN
2008
145views more  IJSN 2008»
14 years 9 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
VTC
2007
IEEE
129views Communications» more  VTC 2007»
15 years 4 months ago
Cross-Layer Partner-Based Fast Handoff Mechanism for IEEE 802.11 Wireless Networks
Abstract— In this paper, we propose a cross-layer partnerbased fast handoff mechanism based on HMIPv6, called as PHMIPv6 protocol. Our PHMIPv6 protocol is a cross-layer, layer-2 ...
Yuh-Shyan Chen, Wei-Han Hsiao, Kau-Lin Chiu
MOBIHOC
2004
ACM
15 years 9 months ago
A scalable approach for reliable downstream data delivery in wireless sensor networks
There exist several applications of sensor networks where reliability of data delivery can be critical. While the redundancy inherent in a sensor network might increase the degree...
Seung-Jong Park, Ramanuja Vedantham, Raghupathy Si...
JCS
2011
126views more  JCS 2011»
14 years 4 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe