Sciweavers

2282 search results - page 164 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
MDM
2010
Springer
250views Communications» more  MDM 2010»
15 years 7 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...
160
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
Barrier Information Coverage with Wireless Sensors
Abstract—Sensor networks have been deployed for many barrier coverage applications such as intrusion detection and border surveillance. In these applications, it is critical to o...
Guanqun Yang, Daji Qiao
WSC
2001
15 years 6 months ago
Simulating networks of wireless sensors
Recent advances in low-power embedded processors, radios, and micro-mechanical systems (MEMs) have made possible the development of networks of wirelessly interconnected sensors. ...
Sung Park, Andreas Savvides, Mani B. Srivastava
141
Voted
MOBIHOC
2002
ACM
16 years 4 months ago
Topology management for sensor networks: exploiting latency and density
In wireless sensor networks, energy efficiency is crucial to achieve satisfactory network lifetime. In order to reduce the energy consumption of a node significantly, its radio ne...
Curt Schurgers, Vlasios Tsiatsis, Saurabh Ganeriwa...
157
Voted
COMCOM
2007
136views more  COMCOM 2007»
15 years 4 months ago
A Delaunay Triangulation based method for wireless sensor network deployment
To obtain a satisfied performance of wireless sensor network, an adaptable sensor deployment method for various applications is essential. In this paper, we propose a centralized ...
Chun-Hsien Wu, Kuo-Chuan Lee, Yeh-Ching Chung