Sciweavers

2282 search results - page 286 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
153
Voted
WCNC
2008
IEEE
15 years 11 months ago
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET
—In this paper, we study the election of multiple leaders for intrusion detection in the presence of selfish nodes in mobile ad hoc networks (MANETs). To balance the resource co...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
ROBOCOMM
2007
IEEE
15 years 11 months ago
Toward multi-level modeling of robotic sensor networks: a case study in acoustic event monitoring
—Modeling and simulation can be powerful tools for analyzing multi-agent systems, such as networked robotic systems and sensor networks. In this paper, it is shown concretely how...
Christopher M. Cianci, Thomas Lochmatter, Jim Pugh...
GLOBECOM
2008
IEEE
15 years 11 months ago
ARQ with Implicit and Explicit ACKs in Wireless Sensor Networks
—A common application of unattended sensor networks (WSN) is low data rate streaming from many scattered sensors to one or more sink nodes. To meet the stringent requirement of p...
Zvi Rosberg, Ren Ping Liu, Alex Y. Dong, Tuan D. L...
182
Voted
ICUMT
2009
15 years 2 months ago
Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks
In WSN-based surveillance systems power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we jointly addres...
Abdallah Makhoul, Rachid Saadi, CongDuc Pham
DCOSS
2011
Springer
14 years 4 months ago
Construction of connected dominating sets in large-scale MANETs exploiting self-stabilization
—Available algorithms for the distributed construction of connected dominating sets in mobile ad hoc networks are inapplicable or suffer from a high complexity. This is mainly du...
Stefan Unterschutz, Volker Turau