Sciweavers

5699 search results - page 322 / 1140
» Applications of Wireless Sensor Networks
Sort
View
SASN
2005
ACM
15 years 10 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra
TDSC
2008
121views more  TDSC 2008»
15 years 4 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
IWCMC
2006
ACM
15 years 11 months ago
Radio propagation patterns in wireless sensor networks: new experimental results
Wireless sensors use low power radio transceivers due to the stringent constraints on battery capacity. As a result, radio transmission with wireless sensors is unreliable. Furthe...
Tereus Scott, Kui Wu, Daniel Hoffman
INFOCOM
2007
IEEE
15 years 11 months ago
Fault-Tolerant Relay Node Placement in Wireless Sensor Networks: Problems and Algorithms
— Two fundamental functions of the sensor nodes in a wireless sensor network are to sense its environment and to transmit sensed information to a basestation. One approach to pro...
Weiyi Zhang, Guoliang Xue, Satyajayant Misra
MOBIHOC
2008
ACM
16 years 4 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao