Sciweavers

376 search results - page 57 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 12 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
ICC
2011
IEEE
257views Communications» more  ICC 2011»
13 years 11 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...
GLOBECOM
2007
IEEE
15 years 6 months ago
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks
Many of the routing protocols that have been designed for wireless ad-hoc networks focus on energy-efficiency and guaranteeing high throughput in a non-adversarial setting. Howev...
Tanya Roosta, Sameer Pai, Phoebus Chen, Shankar Sa...
FBIT
2007
IEEE
15 years 6 months ago
Adaptive Data Dissemination in Sensor Networks Using WPDD
In Wireless Sensor Networks (WSNs), address-based routing approaches often lead to severe problems due to node mobility, energy-saving sleep-cycles, and often missing or unreliabl...
Falko Dressler, Reinhard German, Bettina Krüg...
114
Voted
RTCSA
2008
IEEE
15 years 6 months ago
Real-Time Communications Over Cluster-Tree Sensor Networks with Mobile Sink Behaviour
· Modelling the fundamental performance limits of Wireless Sensor Networks (WSNs) is of paramount importance to understand the behaviour of WSN under worst-case conditions and to...
Petr Jurcík, Ricardo Severino, Anis Koubaa,...