Sciweavers

706 search results - page 72 / 142
» Deploying Four-Connectivity and Full-Coverage Wireless Senso...
Sort
View
IWDC
2005
Springer
128views Communications» more  IWDC 2005»
15 years 3 months ago
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment conï...
Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatr...
PERCOM
2010
ACM
14 years 8 months ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battleï¬eld monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang
WIMOB
2007
IEEE
15 years 4 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
TMC
2012
13 years 5 days ago
Elevator-Assisted Sensor Data Collection for Structural Health Monitoring
—Sensor networks nowadays are widely used for structural health monitoring; for example, the sensor monitoring system deployed on the Guangzhou New TV Tower, China. While wired s...
Tao Zhang, Dan Wang, Jiannong Cao, Yi Qing Ni, Lij...
IPPS
2007
IEEE
15 years 4 months ago
Distributed, Reliable Restoration Techniques using Wireless Sensor Devices
Wireless sensor networks are small, inexpensive and flexible computational platforms, that have found popular applications in various areas including environmental monitoring, he...
Yannis Drougas, Vana Kalogeraki