Sciweavers

2282 search results - page 139 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
INFOCOM
2008
IEEE
15 years 11 months ago
On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast
—Sleep-wake scheduling is an effective mechanism to prolong the lifetime of energy-constrained wireless sensor networks. However, it incurs an additional delay for packet deliver...
Joohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun S...
IJDSN
2006
136views more  IJDSN 2006»
15 years 4 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
NANONET
2009
Springer
233views Chemistry» more  NANONET 2009»
15 years 11 months ago
RF Control of Biological Systems: Applications to Wireless Sensor Networks
We present a vision and preliminary results for a combined RF-Biological Systems where the Electro-Magnetic energy of RF signals is transduced into control-signals for biological s...
Hooman Javaheri, Guevara Noubir, Sanaa Noubir
INFOCOM
2005
IEEE
15 years 10 months ago
A beacon-less location discovery scheme for wireless sensor networks
— In wireless sensor networks (WSNs), sensor location plays a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of l...
Lei Fang, Wenliang Du, Peng Ning
ICDCS
2007
IEEE
15 years 11 months ago
Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks
Contour mapping is a crucial part of many wireless sensor network applications. Many efforts have been made to avoid collecting data from all the sensors in the network and produc...
Yunhao Liu, Mo Li