Digital Repository

Browsing Statistics & Computer Science by Author "Weerasinghe, K.G.H.D."

Browsing Statistics & Computer Science by Author "Weerasinghe, K.G.H.D."

Sort by: Order: Results:

  • Wang, Q.; Leng, S.; Fu, H.; Zang, Y.; Weerasinghe, K.G.H.D. (INFOCOM IEEE Conference on Computer Communications Workshops, 2010)
    This paper proposes a multi-channel MAC scheme for Vehicular Ad Hoc Networks (VANETs), which dynamically adjusts the intervals of Control Channel (CCH) and Service Channels (SCHs). Markov modeling is conducted to optimize ...
  • Dustin, M.; Shankarappa, J.; Petrowski, M.; Weerasinghe, K.G.H.D.; Fu, H. (IEEE EIT?07, 2007)
    A multitude of wireless sensor networks exist today in various fields, each having a specific objective in mind. Based on the objectives for each network, the security concerns can be different, dependent on such factors ...
  • Weerasinghe, K.G.H.D.; Fu, H.; Leng, S. (Information Assurance and Security (IAS), 2010 Sixth International Conference, 2011)
    Communications through road side units in Vehicular Ad hoc Networks (VANETs) can be used to track the location of vehicles, which makes serious threat on users' privacy. In this paper, we propose and evaluate a novel ...
  • Weerasinghe, K.G.H.D.; Elhajj, I.; Krsteva, A.; Najm, M.A. (IEEE/ASME International Conference, 2007)
    This paper presents and evaluates a data centric adaptive in-network aggregation algorithm for wireless sensor networks. In-Network data aggregation is used in wireless sensor networks to reduce the power consumption of ...
  • Jin, K.; Weerasinghe, K.G.H.D.; Fu, H. (Proceedings of 43rd Annual Simulation Symposium (ANSS), 2010)
    Ns-2 is being widely utilized to evaluate the wired and wireless networks on many research activities. The ns-2.33 distribution version includes an extension of IEEE 802.11 module which improves the core functions of 802.11 ...
  • Weerasinghe, K.G.H.D.; Huirong, F. (Intelligence and Security Informatics (ISI), 2011 IEEE International Conference, 2011)
    Communication messages in Vehicular Ad-hoc Networks (VANETs) can be used to track movement of vehicles. In this paper, we address the problem of movement tracking and enhance location privacy without affecting security and ...
  • Weerasinghe, K.G.H.D.; Fu, H. (GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 2010)
    Security mechanisms such as authentication, message integrity, and non-repudiation are extremely important features for both vehicle-to-vehicle and vehicle-to-infrastructure communications in vehicular ad hoc networks. ...
  • Elhajj, I.; Weerasinghe, K.G.H.D.; Dika, A.; Hansen, R. (IROS 2006 IEEE/RSJ International Conference, 2006)
    In this paper we investigate the accuracy of human perception of haptic force direction applied to the hand. Haptic interfaces are commonly used in many applications and understanding the limitations of human perception ...
  • Weerasinghe, K.G.H.D.; Fu, H. (International Journal of Software Engineering and Its Applications, 2008)
    A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to ...
  • Weerasinghe, K.G.H.D.; Tackett, R.; Fu, H. (Security and Communication Networks, 2011)
    In the near future, vehicle-to-vehicle and vehicle-to-roadside infrastructure communications will enable numerous applications, such as collision avoidance, traffic management, location-based services, and infotainment for ...

Search Digital Repository


Browse

My Account