Sciweavers

2282 search results - page 186 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
144
Voted
APSCC
2007
IEEE
15 years 5 months ago
Joint Sink Mobility and Data Diffusion for Lifetime Optimization in Wireless Sensor Networks
Abstract— In this paper, we address the problem of lifetime optimization under storage constraint for wireless sensor networks with a mobile sink node. The problem is particularl...
Yu Gu, Hengchang Liu, Fei Song, Baohua Zhao
241
Voted
SENSYS
2004
ACM
15 years 10 months ago
Using hierarchical location names for scalable routing and rendezvous in wireless sensor networks
Until practical ad-hoc localization systems are developed, early deployments of wireless sensor networks will manually configure location information in network nodes in order to...
Fang Bian, Ramesh Govindan, Scott Shenker, Xin Li
TWC
2008
138views more  TWC 2008»
15 years 4 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
DCOSS
2008
Springer
15 years 6 months ago
Distributed Activity Recognition with Fuzzy-Enabled Wireless Sensor Networks
Wireless sensor nodes can act as distributed detectors for recognizing activities online, with the final goal of assisting the users in their working environment. We propose an act...
Mihai Marin-Perianu, Clemens Lombriser, Oliver Amf...
CSREASAM
2006
15 years 6 months ago
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs)
Wireless ad-hoc networks do not rely on a pre-existing network structure and are characterized by dynamic changes in the topology. This characteristic makes it difficult to perform...
Rajasekhar Yakkali, Gregory Vert