Sciweavers

2362 search results - page 387 / 473
» The wireless network jamming problem
Sort
View
ADHOCNOW
2010
Springer
15 years 6 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
CCN
2006
278views Communications» more  CCN 2006»
15 years 6 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
WICON
2010
15 years 2 months ago
Optimized Content Caching and Request Capture in CNF Networks
In order to meet the overwhelming demands of content retrieval for mobile end users, a novel architecture for the next-generation Internet called Cache-and-Forward (CNF) has been p...
Lijun Dong, Dan Zhang, Yanyong Zhang, Dipankar Ray...
142
Voted
RTAS
2005
IEEE
15 years 10 months ago
Scheduling Messages with Deadlines in Multi-Hop Real-Time Sensor Networks
Consider a team of robots equipped with sensors that collaborate with one another to achieve a common goal. Sensors on robots produce periodic updates that must be transmitted to ...
Huan Li, Prashant J. Shenoy, Krithi Ramamritham
VTC
2010
IEEE
147views Communications» more  VTC 2010»
15 years 3 months ago
Generalized Proportionally Fair Scheduling for Multi-User Amplify-and-Forward Relay Networks
—Providing ubiquitous very high data rate coverage in next generation wireless networks is a formidable goal, requiring cost-effective radio access network (RAN) devices, such as...
Alireza Sharifian, Petar Djukic, Halim Yanikomerog...