Results 31 to 40 of about 59,952 (150)

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Research on Wireless Multi-hop Networks: Current State and Challenges [PDF]

open access: yes, 2011
Wireless multi-hop networks, in various forms and under various names, are being increasingly used in military and civilian applications. Studying connectivity and capacity of these networks is an important problem.
Mao, Guoqiang
core   +1 more source

Experimentation with MANETs of Smartphones

open access: yes, 2017
Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective.
Aguiar, Ana   +3 more
core   +1 more source

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

Performance Modelling and Optimisation of Multi-hop Networks [PDF]

open access: yes, 2012
A major challenge in the design of large-scale networks is to predict and optimise the total time and energy consumption required to deliver a packet from a source node to a destination node.
Abdelrahman, Omer Hassan Omer   +1 more
core   +1 more source

Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks [PDF]

open access: yes, 2014
In a typical multihop Ad-Hoc network, interference and contention increase when flows transit each node towards destination, particularly in the presence of cross-traffic.
Ghita, B., Lancaster, D., Marchang, Jims
core   +1 more source

Developing and Refining a Knowledge Assessment Instrument for Individuals Involved in Managing Occupational Heat Stress: Paper A

open access: yesAmerican Journal of Industrial Medicine, EarlyView.
ABSTRACT Introduction Occupational heat stress poses a critical threat to workers' health, safety, and productivity. To effectively manage this hazard, occupational health and safety (OHS) representatives must comprehensively understand heat stress, heat‐associated injury and disease outcomes, and heat mitigation measures to protect workers.
Emily J. Tetzlaff   +4 more
wiley   +1 more source

Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]

open access: yes, 2006
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal   +5 more
core   +1 more source

Emotional‐cognitive differences during pregnancy: Adaptations for motherhood

open access: yesInfant Mental Health Journal: Infancy and Early Childhood, EarlyView.
Abstract Emerging research suggests that unique adaptations in emotional cognition prepare pregnant women for motherhood. This study compared emotional‐cognitive responses to infant stimuli in 44 pregnant and 34 non‐pregnant Danish participants and explored associations with postpartum outcomes in pregnant participants.
Catrine Sejer   +2 more
wiley   +1 more source

A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

open access: yes, 2010
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs).
Meghanathan, Natarajan   +1 more
core   +2 more sources

Home - About - Disclaimer - Privacy