Back to Results
First PageMeta Content
Consensus / Alice and Bob / Constructible universe / IP / Cryptography / Cryptographic protocols / Public-key cryptography


Of Malicious Motes and Suspicious Sensors On the efficiency of malicious interference in wireless networks Seth Gilbert1 , Rachid Guerraoui2 , and Calvin Newport1 1 MIT CSAIL, {sethg,cnewport}@mit.edu
Add to Reading List

Document Date: 2007-09-28 06:20:39


Open Document

File Size: 231,11 KB

Share Result on Facebook

/

IndustryTerm

malicious devices / time-slotted single-hop wireless radio channel / ubiquitous computing / leader election protocol / wireless network / communication protocol / sub-protocol / awake tiny devices / ad hoc network / wireless networks / honest devices / wireless coordination / energy / cryptographic solutions / broadcast protocol / wireless ad hoc network / network layer protocols / wireless ad hoc networks / n-player protocol / arbitrary n-player protocol / wireless radio channels / malicious device / wireless devices / /

NaturalFeature

Multiple Access Channel / /

Organization

MIT / /

Person

Lower Bound / Bob / Alice / A. Alice / Collin / /

Position

player / simulated player / fellow honest player / Leader leader / Safety leader / malicious player / /

RadioStation

Katz / /

Technology

leader election protocol / arbitrary n-player protocol / wireless devices / else return 1 Algorithm / 3-player communication protocol / Bit Broadcast Sub-Protocol / network layer protocols / Public key / simulation / TDMA / n-player protocol / round-based protocols / /

SocialTag