Sciweavers

1707 search results - page 133 / 342
» Clustering Protocol for Sensor Networks
Sort
View
128
Voted
IJNSEC
2007
171views more  IJNSEC 2007»
15 years 3 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
COMSWARE
2008
IEEE
15 years 10 months ago
Tracking target using sensor networks: target detection and route activation under energy constraints
—In this paper we consider tracking a target moving in a 2D plane using a network of sensors, each of which is capable of detecting presence of the target in its vicinity and com...
Vaishali P. Sadaphal, Bijendra N. Jain
SRDS
2008
IEEE
15 years 10 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
TIT
2010
87views Education» more  TIT 2010»
14 years 10 months ago
Silence-based communication
We consider a power-efficient communication model for wireless sensor networks where silence is used to convey information. We study the average-case and worstcase complexities of ...
Anand K. Dhulipala, Christina Fragouli, Alon Orlit...
160
Voted
PERCOM
2006
ACM
16 years 3 months ago
Efficient Data Harvesting in Mobile Sensor Platforms
In this paper we study the use of vehicles as sensors in a "vehicular sensor network," a new network paradigm that is critical for gathering valuable information in urba...
Uichin Lee, Eugenio Magistretti, Biao Zhou, Mario ...