Sciweavers

2282 search results - page 176 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
130
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
C-MAC: Model-Driven Concurrent Medium Access Control for Wireless Sensor Networks
— This paper presents C-MAC, a new MAC protocol designed to achieve high-throughput bulk communication for dataintensive sensing applications. C-MAC exploits concurrent wireless ...
Mo Sha, Guoliang Xing, Gang Zhou, Shucheng Liu, Xi...
EWSN
2007
Springer
16 years 4 months ago
Crankshaft: An Energy-Efficient MAC-Protocol for Dense Wireless Sensor Networks
Abstract. This paper introduces Crankshaft, a MAC protocol specifically targeted at dense wireless sensor networks. Crankshaft employs node synchronisation and offset wake-up sched...
Gertjan P. Halkes, Koen Langendoen
133
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor Networks
Abstract—Spectrum sensing is one of the key enabling technologies in Cognitive Radio Networks (CRNs). In CRNs, secondary users (SUs) are allowed to exploit the spectrum opportuni...
Yanyan Yang, Yunhuai Liu, Qian Zhang, Lionel M. Ni
157
Voted
ICDCSW
2005
IEEE
15 years 10 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
IPCCC
2007
IEEE
15 years 11 months ago
Composite Event Detection in Wireless Sensor Networks
Sensor networks can be used for event alarming applications. To date, in most of the proposed schemes, the raw or aggregated sensed data is periodically sent to a data consuming c...
Chinh T. Vu, Raheem A. Beyah, Yingshu Li