Sciweavers

159 search results - page 30 / 32
» Deploying wireless sensors to achieve both coverage and conn...
Sort
View
IJSN
2008
145views more  IJSN 2008»
14 years 9 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
MOBIHOC
2003
ACM
15 years 2 months ago
Improving fairness among TCP flows crossing wireless ad hoc and wired networks
In scenarios where wireless ad hoc networks are deployed, sometimes it would be desirable that ad hoc nodes can communicate with servers in wired networks to upload or download da...
Luqing Yang, Winston Khoon Guan Seah, Qinghe Yin
ACSAC
2007
IEEE
15 years 1 months ago
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Set...
MIDDLEWARE
2007
Springer
15 years 3 months ago
Wireless ad hoc VoIP
VoIP is one of the traditional application scenarios for Mobile Ad Hoc Networks (MANETs) in settings such as emergency response. Ideally, VoIP would be transparent to the network ...
Patrick Stuedi, Gustavo Alonso
PERCOM
2010
ACM
14 years 7 months ago
encDPWS - message encoding of SOAP Web Services
—Current efforts in real world deployment of wireless sensor networks end up in the development of the 6LoWPAN protocols. While big industrial consortia develop new technologies,...
Guido Moritz, Dirk Timmermann, Regina Stoll, Frank...