Sciweavers

267 search results - page 32 / 54
» Wireless Handheld Devices Become Trusted Network Devices
Sort
View
PERCOM
2006
ACM
16 years 1 months ago
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks
Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback ...
Tyler Moore
GLOBECOM
2009
IEEE
15 years 8 months ago
Lightweight Jammer Localization in Wireless Networks: System Design and Implementation
—Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is...
Konstantinos Pelechrinis, Iordanis Koutsopoulos, I...
TWC
2008
143views more  TWC 2008»
15 years 1 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
PODC
2009
ACM
15 years 11 months ago
The wireless synchronization problem
In this paper, we study the wireless synchronization problem which requires devices activated at different times on a congested single-hop radio network to synchronize their roun...
Shlomi Dolev, Seth Gilbert, Rachid Guerraoui, Fabi...
PERCOM
2005
ACM
16 years 1 months ago
The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks
This paper investigates a real-world problem termed "Bluetooth (BTH) pollution", which is expected to become commonplace as the mass deployment of BTH devices continues....
Somil Asthana, Dimitris N. Kalofonos