Sciweavers

2282 search results - page 147 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
WS
2004
ACM
15 years 10 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
163
Voted
AINA
2009
IEEE
15 years 11 months ago
An Energy Efficient Chain-Based Clustering Routing Protocol for Wireless Sensor Networks
— Wireless sensor network consisting of a large number of sensors is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited po...
Jae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong ...
AHSWN
2007
116views more  AHSWN 2007»
15 years 4 months ago
On the Lifetime of Large Wireless Sensor Networks with Multiple Battery Levels
Large wireless sensor networks promise to revolutionize the way we sense and control the physical world. In large networks the nodes within the range of the base station forward d...
Mihail L. Sichitiu, Rudra Dutta
DIALM
2008
ACM
139views Algorithms» more  DIALM 2008»
15 years 6 months ago
Approximating maximum integral flows in wireless sensor networks via weighted-degree constrained k-flows
We consider the Maximum Integral Flow with Energy Constraints problem: given a directed graph G = (V, E) with edge-weights {w(e) : e E} and node battery capacities {b(v) : v V }...
Zeev Nutov
CONEXT
2005
ACM
15 years 6 months ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati