Search Results - Algorithm/Protocol Design AND Analysis

Refine Results
  1. 1

    A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks by Jurcut, Anca, Coffey, Tom, Dojen, Reiner

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.11.2019
    “… This technique is realised as a special purpose logic to be used throughout the protocol design stage, where a draft of the protocol is subjected to formal analysis prior to its publication or deployment…”
    Get full text
    Journal Article
  2. 2

    Secure and privacy-preserving sharing of personal health records with multi-party pre-authorization verification by Tan, Kheng-Leong, Chi, Chi-Hung, Lam, Kwok-Yan

    ISSN: 1022-0038, 1572-8196
    Published: New York Springer US 01.08.2024
    Published in Wireless networks (01.08.2024)
    “…Wireless communications play an important role in ensuring ease of access to shared electronic health records (EHR) across health service providers which is…”
    Get full text
    Journal Article
  3. 3

    Privacy-Preserving Aggregate Queries for Optimal Location Selection by Yilmaz, Emre, Ferhatosmanoglu, Hakan, Ayday, Erman, Aksoy, Remzi Can

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.03.2019
    “…Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of…”
    Get full text
    Journal Article
  4. 4

    Spectrum Sharing Among Rapidly Deployable Small Cells: A Hybrid Multi-Agent Approach by Gao, Bo, Lu, Lingyun, Xiong, Ke, Park, Jung-Min, Yang, Yaling, Wang, Yuwei

    ISSN: 1536-1276, 1558-2248
    Published: New York IEEE 01.01.2020
    “…On-demand deployment of small cells plays a key role in augmenting macro-cell coverage for outdoor hotspots, where user devices are brought together and…”
    Get full text
    Journal Article
  5. 5

    Secure Time Synchronization for Wireless Sensor Networks Based on Bilinear Pairing Functions by Rahman, Mizanur, El-Khatib, Khalil

    ISSN: 1045-9219, 1558-2183
    Published: IEEE 2019
    “… Security analysis of the protocol shows that it is highly robust against different attacks, namely selective forwarding attack, wormhole attack, masquerade attack, message manipulation attack, replay…”
    Get full text
    Journal Article
  6. 6

    Byzantine Resilient Protocol for the IoT by Frohlich, Antonio Augusto, Scheffel, Roberto Milton, Kozhaya, David, Verissimo, Paulo Esteves

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.04.2019
    Published in IEEE internet of things journal (01.04.2019)
    “…Wireless sensor networks (WSNs), often adhering to a single gateway architecture, constitute the communication backbone for many modern cyber-physical systems…”
    Get full text
    Journal Article
  7. 7

    Scalable, Distributed, Real-Time Map Generation by Davics, J.J., Beresford, A.R., Hopper, A.

    ISSN: 1536-1268, 1558-2590
    Published: New York IEEE 01.10.2006
    Published in IEEE pervasive computing (01.10.2006)
    “…In this application, many vehicles participate in the collection, processing, and dissemination of data to automatically generate digital road maps. Details…”
    Get full text
    Journal Article
  8. 8

    Integrated Coverage and Connectivity in Wireless Sensor Networks: A Two-Dimensional Percolation Problem by Ammari, Habib M., Das, Sajal K.

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.10.2008
    Published in IEEE transactions on computers (01.10.2008)
    “…While sensing coverage reflects the surveillance quality provided by a wireless sensor network (WSN), network connectivity enables data gathered by sensors to…”
    Get full text
    Journal Article
  9. 9

    Energy-efficient neighbor discovery protocol for mobile wireless sensor networks by Kohvakka, Mikko, Suhonen, Jukka, Kuorilehto, Mauri, Kaseva, Ville, Hännikäinen, Marko, Hämäläinen, Timo D.

    ISSN: 1570-8705, 1570-8713
    Published: Elsevier B.V 2009
    Published in Ad hoc networks (2009)
    “…Low energy consumption is a critical design requirement for most wireless sensor network (WSN) applications…”
    Get full text
    Journal Article
  10. 10

    Promoting Heterogeneity, Mobility, and Energy-Aware Voronoi Diagram in Wireless Sensor Networks by Ammari, H.M., Das, S.K.

    ISSN: 1045-9219, 1558-2183
    Published: New York IEEE 01.07.2008
    “…). It has been shown through analysis and simulation that it is impossible to guarantee uniform energy depletion of all the sensors in static uniformly distributed always-on WSNs with constant data…”
    Get full text
    Journal Article
  11. 11

    Optimizing Communication Overhead while Reducing Path Length in Beaconless Georouting with Guaranteed Delivery for Wireless Sensor Networks by Ruhrup, Stefan, Stojmenovic, Ivan

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.12.2013
    Published in IEEE transactions on computers (01.12.2013)
    “…Beaconless or contention-based geographic routing algorithms forward packets toward a geographical destination reactively without the knowledge of the…”
    Get full text
    Journal Article
  12. 12

    Cloud-Based Desktop Services for Thin Clients by Deboosere, L., Vankeirsbilck, B., Simoens, P., De Turck, F., Dhoedt, B., Demeester, P.

    ISSN: 1089-7801
    Published: IEEE 01.11.2012
    Published in IEEE internet computing (01.11.2012)
    “…Cloud computing and ubiquitous network availability have renewed people's interest in the thin client concept. By executing applications in virtual desktops on…”
    Get full text
    Journal Article
  13. 13

    A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking by Liqiang Zhang, Qiang Cheng, Yingge Wang, Zeadally, S.

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.02.2008
    Published in IEEE transactions on computers (01.02.2008)
    “…As one of the fundamental issues in wireless sensor networks (WSNs), the sensor localization problem has recently received extensive attention. In this work,…”
    Get full text
    Journal Article
  14. 14

    Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference by Young, M., Boutaba, R.

    ISSN: 2373-745X
    Published: IEEE 01.01.2011
    Published in IEEE Communications surveys and tutorials (01.01.2011)
    “…Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the…”
    Get full text
    Journal Article
  15. 15

    Cooperative Positive Orthogonal Code-Based Forwarding for Multi-Hop Vehicular Networks by Le Zhang, Hassanabadi, Behnam, Valaee, Shahrokh

    ISSN: 1536-1276, 1558-2248
    Published: New York, NY IEEE 01.07.2014
    “…Reliable multi-hop forwarding in vehicular networks is required by many critical intelligent transportation system (ITS) safety applications. Cooperative…”
    Get full text
    Journal Article
  16. 16

    An Efficient Directed Localization Recursion Protocol for Wireless Sensor Networks by de Oliveira, H.A.B.F., Boukerche, A., Nakamura, E.F., Loureiro, A.A.F.

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.05.2009
    Published in IEEE transactions on computers (01.05.2009)
    “…The establishment of a localization system is an important task in wireless sensor networks. Due to the geographical correlation between sensed data, location…”
    Get full text
    Journal Article
  17. 17

    Overlay Networks with Linear Capacity Constraints by Zhu, Ying, Li, Baochun

    ISSN: 1045-9219, 1558-2183
    Published: New York IEEE 01.02.2008
    “… (in representing the true network topology) and efficiency (that is, performance). Through analysis and simulations, we show that LCC-overlay is perfectly accurate and, hence, enjoys much higher efficiency than the inaccurate independent overlay…”
    Get full text
    Journal Article
  18. 18

    Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks by Xing, Guoliang, Wang, Jianping, Yuan, Zhaohui, Tan, Rui, Sun, Limin, Huang, Qingfeng, Jia, Xiaohua, So, Hing Cheung

    ISSN: 1045-9219, 1558-2183
    Published: New York IEEE 01.12.2010
    “…Wireless sensor networks (WSNs) deployed for mission-critical applications face the fundamental challenge of meeting stringent spatiotemporal performance…”
    Get full text
    Journal Article
  19. 19

    A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks by Derhab, A., Badache, N.

    ISSN: 1045-9219, 1558-2183
    Published: New York IEEE 01.07.2008
    “…The classical definition of a self-stabilizing algorithm assumes generally that there are no faults in the system long enough for the algorithm to stabilize…”
    Get full text
    Journal Article
  20. 20

    Energy-efficient algorithms for data retrieval from indexed parallel broadcast channels by Hurson, Ali R., Sedigh Sarvestani, Sahra, Wisely, Mike

    ISSN: 2210-5379
    Published: Elsevier Inc 01.12.2017
    “…•This includes additional simulation runs, and analysis of new results. The advances in mobile device and wireless communication techniques have enabled anywhere, anytime information access…”
    Get full text
    Journal Article