Throughput maximization in multi-hop wireless networks under a secrecy constraint

PHJ Nardelli, H Alves, CHM De Lima, M Latva-Aho - Computer Networks, 2016 - Elsevier
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial
applications under a secrecy constraint and malicious jamming. The evaluation scenario …

Throughput maximization in multi-hop wireless networks under a secrecy constraint

PHJ Nardelli, H Alves, CHM de Lima, M Latva-aho - 2016 - lareferencia.info
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial
applications under a secrecy constraint and malicious jamming. The evaluation scenario …

[PDF][PDF] Throughput maximization in multi-hop wireless networks under a secrecy constraint

PHJ Nardelli, H Alves, CHM de Lima… - Computer …, 2016 - repositorio.unesp.br
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial
applications under a secrecy constraint and malicious jamming. The evaluation scenario …

Throughput Maximization in Multi-Hop Wireless Networks under Secrecy Constraint

PHJ Nardelli, H Alves, CHM de Lima… - arXiv preprint arXiv …, 2015 - arxiv.org
This paper analyzes the throughput of industrial communication networks under a secrecy
constraint. The proposed scenario is composed by sensors that measure some relevant …

Throughput maximization in multi-hop wireless networks under a secrecy constraint

PHJ Nardelli, H Alves, CHM de Lima, M Latva-aho - Computer Networks, 2016 - infona.pl
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial
applications under a secrecy constraint and malicious jamming. The evaluation scenario …

Throughput Maximization in Multi-Hop Wireless Networks under Secrecy Constraint

PHJ Nardelli, H Alves, CHM de Lima… - arXiv e …, 2015 - ui.adsabs.harvard.edu
This paper analyzes the throughput of industrial communication networks under a secrecy
constraint. The proposed scenario is composed by sensors that measure some relevant …

[PDF][PDF] Throughput maximization in multi-hop wireless networks under a secrecy constraint

PHJ Nardelli, H Alves, CHM de Lima, M Latva-aho - 2016 - repositorio.unesp.br
abstract This paper analyzes the achievable throughput of multi-hop sensor networks for
industrial applications under a secrecy constraint and malicious jamming. The evaluation …