Sciweavers

834 search results - page 116 / 167
» Understanding Node Localizability of Wireless Ad-hoc Network...
Sort
View
ADHOC
2007
115views more  ADHOC 2007»
14 years 10 months ago
Modeling adaptive node capture attacks in multi-hop wireless networks
We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev–Yao model are know...
Patrick Tague, Radha Poovendran
TMC
2008
108views more  TMC 2008»
14 years 9 months ago
Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks
Abstract--Two well-known problems that can cause performance degradations in IEEE 802.11 wireless networks are the exposednode (EN) and hidden-node (HN) problems. Although there ha...
Li Bin Jiang, Soung Chang Liew
IJSN
2007
120views more  IJSN 2007»
14 years 9 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
MOBIHOC
2003
ACM
15 years 9 months ago
Lightweight sensing and communication protocols for target enumeration and aggregation
The development of lightweight sensing and communication protocols is a key requirement for designing resource constrained sensor networks. This paper introduces a set of efficien...
Qing Fang, Feng Zhao, Leonidas J. Guibas
INFOCOM
2009
IEEE
15 years 4 months ago
Exact Analysis of Latency of Stateless Opportunistic Forwarding
Abstract—Stateless opportunistic forwarding is a simple faulttolerant distributed approach for data delivery and information querying in wireless ad hoc networks, where packets a...
Chi-Kin Chau, Prithwish Basu