Sciweavers

2282 search results - page 114 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
EUC
2007
Springer
15 years 10 months ago
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks
Abstract. Random key pre-distribution schemes are vulnerable to collusion attacks. In this paper, we propose a new key management scheme for ubiquitous heterogeneous sensor network...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
156
Voted
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
16 years 4 months ago
Energy and rate based MAC protocol for wireless sensor networks
Abstract-- Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote environments. This makes the problem of conserving energy at individ...
Rajgopal Kannan, Ramaraju Kalidindi, S. Sitharama ...
170
Voted
PERVASIVE
2008
Springer
15 years 4 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
121
Voted
ICDCSW
2008
IEEE
15 years 11 months ago
Mobility Control for Complete Coverage in Wireless Sensor Networks
In this paper, we propose a new control method to cover the “holes” in wireless sensor networks. Many applications often face the problem of holes when some sensor nodes are d...
Zhen Jiang, Jie Wu, Robert Kline, Jennifer Krantz
147
Voted
PIMRC
2008
IEEE
15 years 11 months ago
A hierarchical structure based coverage repair in wireless sensor networks
—In this paper, we propose a new control method to cover “holes” in wireless sensor networks. Many applications often face the problem of holes when some sensor nodes are dis...
Jie Wu, Zhen Jiang