Sciweavers

2282 search results - page 150 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
TRIDENTCOM
2006
IEEE
15 years 10 months ago
The utility of perceptive communication between distant wireless nodes
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
ICN
2005
Springer
15 years 10 months ago
Two Energy-Efficient Routing Algorithms for Wireless Sensor Networks
: Power Conservation is one of the most important challenges in wireless sensor networks. In this paper, we present two minimum-energy routing algorithms. Our main goal is to reduc...
Hung Le Xuan, Youngku Lee, Sungyoung Lee
DSN
2004
IEEE
15 years 8 months ago
Evaluating the Impact of Limited Resource on the Performance of Flooding in Wireless Sensor Networks
Abstract-- Wireless sensor networks (WSNs) are large collections of resource limited nodes, densely deployed over a landscape. They gather and disseminate local data using multihop...
Patrick Downey, Rachel Cardell-Oliver
131
Voted
AINA
2008
IEEE
15 years 11 months ago
Senceive: A Middleware for a Wireless Sensor Network
— A significant amount of research effort is being carried out by the research community to increase the scope and usefulness of wireless sensor networks; to optimise life time ...
Christian Hermann, Waltenegus Dargie
TIFS
2008
208views more  TIFS 2008»
15 years 4 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros