Sciweavers

2282 search results - page 196 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
146
Voted
MSN
2005
Springer
15 years 10 months ago
Using MDS Codes for the Key Establishment of Wireless Sensor Networks
Key pre-distribution techniques for security provision of Wireless Sensor Networks (WSNs) have attracted significant interests recently. In these schemes, a relatively small numbe...
Jing Deng, Yunghsiang S. Han
166
Voted
GI
2005
Springer
15 years 10 months ago
On-demand Construction of Non-interfering Multiple Paths in Wireless Sensor Networks
: In this paper we present a routing scheme for on-demand construction of multiple non-interfering paths in wireless sensor networks. One usage of this multipath scheme is to provi...
Thiemo Voigt, Adam Dunkels, Torsten Braun
NSDI
2010
15 years 6 months ago
Exploring Link Correlation for Efficient Flooding in Wireless Sensor Networks
Existing flooding algorithms have demonstrated their effectiveness in achieving communication efficiency and reliability in wireless sensor networks. However, further performance ...
Ting Zhu, Ziguo Zhong, Tian He, Zhi-Li Zhang
BROADNETS
2005
IEEE
15 years 10 months ago
A Lightweight framework for source-to-sink data transfer in wireless sensor networks
— Lightweight protocols that are both bandwidth and power thrifty are desirable for sensor networks. In addition, for many sensor network applications, timeliness of data deliver...
James Jobin, Zhenqiang Ye, Honomount Rawat, Srikan...
PERCOM
2006
ACM
16 years 4 months ago
Efficient Data Harvesting in Mobile Sensor Platforms
In this paper we study the use of vehicles as sensors in a "vehicular sensor network," a new network paradigm that is critical for gathering valuable information in urba...
Uichin Lee, Eugenio Magistretti, Biao Zhou, Mario ...