Sciweavers

2282 search results - page 113 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
GLOBECOM
2007
IEEE
15 years 11 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
150
Voted
SAMOS
2007
Springer
15 years 10 months ago
k  +   Neigh : An Energy Efficient Topology Control for Wireless Sensor Networks
For most applications in wireless sensor networks (WSNs), it is often assumed that the deployment of sensor nodes is unmanaged and random, so the density of local node may vary thr...
Dong-Min Son, Young-Bae Ko
AICCSA
2006
IEEE
168views Hardware» more  AICCSA 2006»
15 years 10 months ago
Power Efficient Algorithms for Computing Fast Fourier Transform over Wireless Sensor Networks
Collaborative signal processing is one of the most promising applications that are currently being investigated for sensor networks. In this paper, we use FFT computation as a veh...
Turkmen Canli, Ajay K. Gupta, Ashfaq A. Khokhar
IPSN
2005
Springer
15 years 10 months ago
Avrora: scalable sensor network simulation with precise timing
— Simulation can be an important step in the development of software for wireless sensor networks and has been the subject of intense research in the past decade. While most prev...
Ben Titzer, Daniel K. Lee, Jens Palsberg
227
Voted
PERCOM
2010
ACM
14 years 11 months ago
Local map generation using position and communication history of mobile nodes
In this paper, we propose an algorithm to estimate 2D shapes and positions of obstacles such as buildings using GPS and wireless communication history of mobile nodes. Our algorith...
Shinichi Minamimoto, Sae Fujii, Hirozumi Yamaguchi...