Sciweavers

2282 search results - page 271 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
156
Voted
SIGSOFT
2009
ACM
15 years 9 months ago
Srijan: a graphical toolkit for sensor network macroprogramming
Macroprogramming is an application development technique for wireless sensor networks (WSNs) where the developer specifies the behavior of the system, as opposed to that of the c...
Animesh Pathak, Mahanth K. Gowda
DCOSS
2010
Springer
15 years 8 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
16 years 6 months ago
Outlier-Aware Data Aggregation in Sensor Networks
In this paper we discuss a robust aggregation framework that can detect spurious measurements and refrain from incorporating them in the computed aggregate values. Our framework ca...
Antonios Deligiannakis, Vassilis Stoumpos, Yannis ...
154
Voted
DCOSS
2005
Springer
15 years 10 months ago
A Distributed Greedy Algorithm for Connected Sensor Cover in Dense Sensor Networks
Abstract. Achieving optimal battery usage and prolonged network lifetime are two of the most fundamental issues in wireless sensor networks. By exploiting node and data redundancy ...
Amitabha Ghosh, Sajal K. Das
ICCS
2007
Springer
15 years 11 months ago
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
Tran Thanh Dai, Choong Seon Hong