Sciweavers

21 search results - page 4 / 5
» Robust key generation from signal envelopes in wireless netw...
Sort
View
SUTC
2010
IEEE
13 years 9 months ago
ASample: Adaptive Spatial Sampling in Wireless Sensor Networks
Abstract—A prominent application of Wireless Sensor Networks is the monitoring of physical phenomena. The value of the monitored attributes naturally depends on the accuracy of t...
Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri
GLOBECOM
2009
IEEE
14 years 16 days ago
On the Performance Gains of VoIP Aggregation and ROHC over a WirelessMAN-OFDMA Air Interface
—A growing number of mobile WiMAX deployments are in progress world-wide and the technology is anticipated to play a key role in next generation mobile broadband wireless network...
Jarno Pinola, Esa Piri, Kostas Pentikousis
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
13 years 10 months ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
IJDSN
2006
136views more  IJDSN 2006»
13 years 5 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
MOBISYS
2005
ACM
14 years 5 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf