Sciweavers

576 search results - page 59 / 116
» Challenges: communication through silence in wireless sensor...
Sort
View
IFIP
2007
Springer
15 years 6 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
FMOODS
2007
15 years 2 months ago
Formal Modeling and Analysis of the OGDC Wireless Sensor Network Algorithm in Real-Time Maude
This paper describes the application of Real-Time Maude to the formal specification, simulation, and further formal analysis of the sophisticated state-of-the-art OGDC wireless se...
Peter Csaba Ölveczky, Stian Thorvaldsen
SECON
2007
IEEE
15 years 6 months ago
Approximation Algorithm for Base Station Placement in Wireless Sensor Networks
Base station location has significant impact on network lifetime performance for a sensor network. For a multihop sensor network, this problem is particular challenging as we need ...
Yi Shi, Yiwei Thomas Hou
IPPS
2006
IEEE
15 years 6 months ago
Formal modeling and analysis of wireless sensor network algorithms in Real-Time Maude
Advanced wireless sensor network algorithms pose challenges to their formal modeling and analysis, such as modeling probabilistic and real-time behaviors and novel forms of commun...
Peter Csaba Ölveczky, Stian Thorvaldsen
93
Voted
COMSWARE
2007
IEEE
15 years 7 months ago
RAT: Routing by Adaptive Targeting in Wireless Sensor/Actor Networks
— Wireless sensor networks have attracted significant interest for various scientific, military, and e-health applications. Recently a new class of sensor networks “sensor/ac...
Ghalib A. Shah, Muslim Bozyigit, Demet Aksoy