Sciweavers

2282 search results - page 107 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
COLCOM
2007
IEEE
15 years 11 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
SECON
2007
IEEE
15 years 10 months ago
Coverage Protocol for Wireless Sensor Networks Using Distance Estimates
— In wireless sensor networks, it is desirable to maintain good sensing coverage while keeping the number of active sensor nodes small to achieve long system lifetime. Existing c...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda
PERCOM
2005
ACM
16 years 4 months ago
Sensor Data Collection with Expected Reliability Guarantees
Due to the fragility of small sensors, their finite energy supply and the loss of packets in the wireless channel, reports from sensors may not reach the sink node. In this paper ...
Qi Han, Iosif Lazaridis, Sharad Mehrotra, Nalini V...
APNOMS
2006
Springer
15 years 8 months ago
A Policy-Based Management Framework for Self-managed Wireless Sensor Networks
This paper proposes a policy-based management framework for self-managed wireless sensor networks (WSNs) called SNOWMAN (SeNsOr netWork MANagement). In WSNs, a number of sensor nod...
Jong-Eon Lee, Si-Ho Cha, Jae-Oh Lee, Seokjoong Kan...
ICC
2009
IEEE
190views Communications» more  ICC 2009»
15 years 11 months ago
Protecting Location Privacy in Large-Scale Wireless Sensor Networks
—In a wireless sensor network, an adversary equipped monitoring antenna can easily overhear packets, which may facilitate identifying the directions of packet flows and trace to ...
Lei Kang