Sciweavers

376 search results - page 68 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
SASN
2003
ACM
15 years 2 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee
ACMSE
2010
ACM
14 years 7 months ago
Dissemination and presentation of high resolution air pollution data from mobile sensor nodes
This paper presents the framework of a mobile air quality monitoring network, with an in-depth discussion of several new innovative techniques for web-based visualization. These t...
Will Hedgecock, Péter Völgyesi, &Aacut...
IJNSEC
2007
137views more  IJNSEC 2007»
14 years 9 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
INFOCOM
2006
IEEE
15 years 3 months ago
Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Rep
— This paper investigates theoretical aspects of the uneven energy depletion phenomenon recently noticed in sink-based wireless sensor networks. We consider uniformly distributed...
Stephan Olariu, Ivan Stojmenovic
SENSYS
2006
ACM
15 years 3 months ago
Scalable data aggregation for dynamic events in sensor networks
Computing and maintaining network structures for efficient data aggregation incurs high overhead for dynamic events where the set of nodes sensing an event changes with time. Mor...
Kai-Wei Fan, Sha Liu, Prasun Sinha