Sciweavers

2282 search results - page 199 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
LCN
2006
IEEE
15 years 11 months ago
Cross-Level Sensor Network Simulation with COOJA
Simulators for wireless sensor networks are a valuable tool for system development. However, current simulators can only simulate a single level of a system at once. This makes sy...
Fredrik Österlind, Adam Dunkels, Joakim Eriks...
COMCOM
2006
79views more  COMCOM 2006»
15 years 5 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
MDM
2007
Springer
148views Communications» more  MDM 2007»
15 years 11 months ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen
TSP
2008
131views more  TSP 2008»
15 years 5 months ago
Smart Sleeping Policies for Energy Efficient Tracking in Sensor Networks
We study the problem of tracking an object that is moving randomly through a dense network of wireless sensors. We assume that each sensor has a limited range for detecting the pr...
Jason A. Fuemmeler, Venugopal V. Veeravalli
INFOCOM
2007
IEEE
15 years 11 months ago
Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks
—Providing efficient and reliable communication in wireless sensor networks is a challenging problem. To recover from corrupted packets, previous approaches have tried to use re...
Qing Cao, Tarek F. Abdelzaher, Tian He, Robin Krav...