Sciweavers

2282 search results - page 360 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
RTSS
2009
IEEE
15 years 11 months ago
Spatiotemporal Delay Control for Low-Duty-Cycle Sensor Networks
—Data delivery is a major function of sensor network applications. Many applications, such as military surveillance, require the detection of interested events to be reported to ...
Yu Gu, Tian He, Mingen Lin, Jinhui Xu
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 10 months ago
An Event-Detection Estimation Model for Hybrid Adaptive Routing in WSNs
— A fundamental goal of a wireless sensor network (WSN) is to collect and deliver data to external applications. Due to the strong constraints of these networks, routing algorith...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...
WWIC
2007
Springer
125views Communications» more  WWIC 2007»
15 years 10 months ago
Fault Tolerant Scalable Support for Network Portability and Traffic Engineering
The P-SHIM6 architecture provides ISP independence to IPv6 sites without compromising scalability. This architecture is based on a middle-box, the P-SHIM6, which manages the SHIM6 ...
Marcelo Bagnulo, Alberto García-Martí...
JSAC
2006
156views more  JSAC 2006»
15 years 4 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
CCR
2006
85views more  CCR 2006»
15 years 4 months ago
Troubleshooting wireless mesh networks
Effective network troubleshooting is critical for maintaining efficient and reliable network operation. Troubleshooting is especially challenging in multi-hop wireless networks be...
Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou