Sciweavers

2282 search results - page 306 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
GLOBECOM
2007
IEEE
15 years 11 months ago
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ALGOSENSORS
2004
Springer
15 years 10 months ago
Multi: A Hybrid Adaptive Dissemination Protocol for Wireless Sensor Networks
Abstract. Data dissemination (routing) is a basic function in wireless sensor networks. Dissemination algorithms for those networks depend on the characteristics of the application...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...
ANSS
2007
IEEE
15 years 11 months ago
Scalable Data Collection Protocols for Wireless Sensor Networks with Multiple Mobile Sinks
Data propagation in wireless sensor networks is usually performed as a multihop process. To deliver a single message, the resources of many sensor nodes are used and a lot of ener...
Athanasios Kinalis, Sotiris E. Nikoletseas
133
Voted
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 11 months ago
Robust Localization in Wireless Sensor Networks through the Revocation of Malicious Anchors
— In a wireless sensor network (WSN), the sensor nodes (SNs) generally localize themselves with the help of anchors that are pre-deployed in the network. Time of Arrival (ToA) is...
Satyajayant Misra, Guoliang Xue, Aviral Shrivastav...
APWEB
2008
Springer
15 years 6 months ago
An Energy-Efficient Multi-agent Based Architecture in Wireless Sensor Network
Wireless sensor network (WSN) containing thousands of tiny and low-power nodes can be used to monitor environment. An energy-efficient and reliable wireless communication architect...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...