The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A wide range of applications such as disaster management, military, and security have fueled interest in sensor networks in recent years. Since the employed sensor nodes often are significantly constrained in their onboard energy, most of the research work, including that on medium access control (MAC) protocols, has focused on optimizing energy consumptions and cared less about data delivery latency...
Multicast streams are the dominant application traffic pattern in many mission critical ad-hoc networks. The limited computation and communication resources, the large scale deployment and the unguaranteed connectivity to trusted authorities make known security solutions for wired and single-hop wireless networks inappropriate for such application environment. This paper promotes a novel Tiered Authentication...
This paper introduces a novel optimization strategy for increasing the resource efficiency and security of data routing in a wireless sensor network. Most secure routing schemes found in the literature provision security at the highest level by involving sophisticated data encryption with a large key. This imposes lots of overhead both in computation, while performing the encryption and decryption,...
In wireless networks, the limited available bandwidth combined with varying signal propagation conditions make it necessary to pursue optimization across all layers of the protocol stack in order to boost the achievable throughput. One of the optimization strategies that is deemed to be effective is to dynamically adjust the packet size either to better suit the channel conditions or to minimize the...
In this paper we describe a novel medium access control (MAC) solution for establishing a wireless LAN capable of supporting contention and contention free access on the same channel for use in mobile ad-hoc networks (MANET). This new MAC protocol is fully decentralized and allows any number of mobile stations to share a common wireless channel and collaborate in managing its resources. These stations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.