Sciweavers

2282 search results - page 341 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
TMC
2011
1105views more  TMC 2011»
14 years 11 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
CPE
1998
Springer
123views Hardware» more  CPE 1998»
15 years 8 months ago
A Modular and Scalable Simulation Tool for Large Wireless Networks
This paper describes a modular and scalable simulation environment, called GloMoSim, to evaluate end-to-end performance of integrated wired and wireless networks. GloMoSim has been...
Rajive Bagrodia, Mario Gerla
TMC
2010
158views more  TMC 2010»
15 years 2 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
156
Voted
SECON
2008
IEEE
15 years 10 months ago
Enhancing the Data Collection Rate of Tree-Based Aggregation in Wireless Sensor Networks
— What is the fastest rate at which we can collect a stream of aggregated data from a set of wireless sensors organized as a tree? We explore a hierarchy of techniques using real...
Özlem Durmaz Incel, Bhaskar Krishnamachari
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 10 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay