Sciweavers

172 search results - page 13 / 35
» ARMS: An Authenticated Routing Message in Sensor Networks
Sort
View
TMC
2012
12 years 12 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
IWCMC
2006
ACM
15 years 3 months ago
Distributed obstacle localization in large wireless sensor networks
Obstacles are but pleasing for many aspects of large realworld sensor networks. Among other things, the presence of obstacles distort the sensor node localization process and migh...
Frank Reichenbach, Ralf Salomon, Dirk Timmermann
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 9 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
TOSN
2011
116views more  TOSN 2011»
14 years 4 months ago
A model framework for greedy routing in a sensor network with a stochastic power scheme
A stochastic model is formulated and analyzed to study the advancements of messages under greedy routing in a sensor network with a power-saving scheme. The aim of this model is g...
Holger Paul Keeler, Peter G. Taylor
VTC
2008
IEEE
158views Communications» more  VTC 2008»
15 years 3 months ago
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks
Abstract— Balancing energy consumption and prolonging network lifetime are open challenges in Wireless Sensor Networks. In this paper, we design a novel load balanced routing pro...
Chengjie Wu, Ruixi Yuan, Hongchao Zhou