Excess capacity (EC) is the unused capacity in a network. Excess capacity management techniques exploit the EC to improve the network performance. In this paper we propose EC management techniques that exploit EC to improve all the three performance metrics. EC management techniques differ in two respects: when connections are migrated from one protection scheme […]
Protecting Source and Sink Location Privacy in Sensor Networks
Location privacy is very important, especially in hostile environments. Failure to protect such information can completely subvert the intended purposes of sensor network applications. A number of privacy-preserving routing techniques have been developed for sensor networks. However, most of them are designed to protect against an adversary only capable of eavesdropping on a limited portion […]