warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
217views more  JUCS 2010»
12 years 24 days ago
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
: The use of multimedia sensor nodes can significantly enhance the capability of wireless sensor networks (WSNs) for event description. In a number of scenarios, e.g., an erupting ...
Lei Shu, Manfred Hauswirth, Yan Zhang, Jianhua Ma,...
389views more  JIPS 2010»
12 years 24 days ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
355views more  TSMC 2011»
12 years 28 days ago
Particle Swarm Optimization in Wireless-Sensor Networks: A Brief Survey
—Wireless sensor networks (WSNs) are networks of autonomous nodes used for monitoring an environment. Developers of WSNs face challenges that arise from communication link failur...
Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy
12 years 4 months ago
Cluster-Based Correlated Data Gathering in Wireless Sensor Networks
—We consider the problem of optimal cluster-based data gathering in Wireless Sensor Networks (WSNs) when nearby readings are spatially correlated. Due to the dense nature of WSNs...
Ali Dabirmoghaddam, Majid Ghaderi, Carey L. Willia...
98views more  JCM 2007»
12 years 5 months ago
A Fault Tolerance Management Framework for Wireless Sensor Networks
Abstract— Wireless Sensor Networks (WSNs) have the potential of significantly enhancing our ability to monitor and interact with our physical environment. Realizing a faulttoler...
Iman Saleh, Mohamed Eltoweissy, Adnan Agbaria, Hes...
12 years 6 months ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...
93views more  IJSN 2006»
12 years 6 months ago
Limiting DoS attacks during multihop data delivery in wireless sensor networks
: Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs ar...
Jing Deng, Richard Han, Shivakant Mishra