Sciweavers

376 search results - page 59 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
WINET
2010
153views more  WINET 2010»
14 years 10 months ago
Data aggregation in sensor networks using learning automata
One way to reduce energy consumption in wireless sensor networks is to reduce the number of packets being transmitted in the network. As sensor networks are usually deployed with a...
Mehdi Esnaashari, Mohammad Reza Meybodi
INDOCRYPT
2009
Springer
15 years 6 months ago
Towards Secure and Practical MACs for Body Sensor Networks
Wireless sensor network (WSN) commonly requires lower level security for public information gathering, whilst body sensor network (BSN) must be secured with strong authenticity to...
Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zh...
SASN
2006
ACM
15 years 5 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia
WIOPT
2010
IEEE
14 years 10 months ago
Minimizing transmission energy in sensor networks via trajectory control
—Energy optimization is a significant component of Wireless Sensor Network (WSN) design. In this paper we consider transmission energy optimization in WSNs where messages are co...
Delia Ciullo, Guner D. Celik, Eytan Modiano
CCS
2008
ACM
15 years 1 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia