Sciweavers

613 search results - page 44 / 123
» A Walking Beacon-Assisted Localization in Wireless Sensor Ne...
Sort
View
JSAC
2006
127views more  JSAC 2006»
14 years 9 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
INFOCOM
2010
IEEE
14 years 8 months ago
VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones
—Wireless sensor network (WSN) applications require redundant sensors to guarantee fault tolerance. However, the same degree of redundancy is not necessary for multi-hop communic...
Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu
CIDR
2007
185views Algorithms» more  CIDR 2007»
14 years 11 months ago
Rethinking Data Management for Storage-centric Sensor Networks
Data management in wireless sensor networks has been an area of significant research in recent years. Many existing sensor data management systems view sensor data as a continuou...
Yanlei Diao, Deepak Ganesan, Gaurav Mathur, Prasha...
PETRA
2010
ACM
15 years 1 months ago
Opportunistic strategies for lightweight signal processing for body sensor networks
We present a mobile platform for body sensor networking based on a smartphone for lightweight signal processing of sensor mote data. The platform allows for local processing of da...
Edmund Y. W. Seto, Eladio Martin, Allen Y. Yang, P...
INFOCOM
2007
IEEE
15 years 4 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen