Sciweavers

1482 search results - page 204 / 297
» Wireless LAN Security
Sort
View
ICCSA
2010
Springer
15 years 8 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
SPW
2000
Springer
15 years 5 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
EWSN
2009
Springer
16 years 2 months ago
Cooperative Intrusion Detection in Wireless Sensor Networks
We consider the problem of cooperative intrusion detection in wireless sensor networks where the nodes are equipped with local detector modules and have to identify the intruder in...
Ioannis Krontiris, Zinaida Benenson, Thanassis Gia...
ICC
2007
IEEE
245views Communications» more  ICC 2007»
15 years 8 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
DEXAW
2006
IEEE
165views Database» more  DEXAW 2006»
15 years 7 months ago
Design of a Web-Based Application for Wireless Sensor Networks
Wireless sensor networks (WSNs) are used for various ubiquitous and pervasive environments. A few common applications are security, agriculture, automation, and environmental moni...
Sajid Hussain, Nick Schofield, Abdul Wasey Matin