Sciweavers

1331 search results - page 116 / 267
» Trust Establishment in Distributed Networks: Analysis and Mo...
Sort
View
SASN
2005
ACM
15 years 3 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
CCS
2008
ACM
14 years 12 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
TWC
2008
109views more  TWC 2008»
14 years 9 months ago
Service Time Approximation in IEEE 802.11 Single-Hop Ad Hoc Networks
Abstract-- This paper investigates the near-memoryless behavior of the service time for IEEE 802.11 saturated single-hop ad hoc networks. We show that the number of packets success...
Atef Abdrabou, Weihua Zhuang
DCOSS
2005
Springer
15 years 3 months ago
Analysis of Gradient-Based Routing Protocols in Sensor Networks
Abstract. Every physical event results in a natural information gradient in the proximity of the phenomenon. Moreover, many physical phenomena follow the diffusion laws. This natu...
Jabed Faruque, Konstantinos Psounis, Ahmed Helmy
LCN
2005
IEEE
15 years 3 months ago
Delay and Throughput Analysis of IEEE 802.11e EDCA with Starvation Prediction
— An analytical model is proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA provides class-b...
Paal Engelstad, Olav N. Østerbø