Sciweavers

2282 search results - page 384 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
MOBIHOC
2005
ACM
16 years 3 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
EWSN
2006
Springer
16 years 3 months ago
On the Scalability of Routing Integrated Time Synchronization
Time synchronization is a crucial component of a large class of sensor network applications, traditionally implemented as a standalone middleware service that provides a virtual gl...
János Sallai, Branislav Kusy, Ákos L...
TMC
2008
120views more  TMC 2008»
15 years 4 months ago
Mitigating Performance Degradation in Congested Sensor Networks
Data generated in wireless sensor networks may not all be alike: some data may be more important than others and hence may have different delivery requirements. In this paper, we a...
Raju Kumar, Riccardo Crepaldi, Hosam Rowaihy, Albe...
HICSS
2005
IEEE
185views Biometrics» more  HICSS 2005»
15 years 9 months ago
HEAR-SN: A New Hierarchical Energy-Aware Routing Protocol for Sensor Networks
Wireless sensor networks are becoming an integral part of numerous applications very quickly. Here, we present a new approach for sensor applications that requires coverage for a ...
Michael Hempel, Hamid Sharif, Prasad Raviraj
INFOCOM
2009
IEEE
15 years 10 months ago
An Adaptive Link Layer for Range Diversity in Multi-Radio Mobile Sensor Networks
—An important challenge in mobile sensor networks is to enable energy-efficient communication over a diversity of distances while being robust to wireless effects caused by node...
Jeremy Gummeson, Deepak Ganesan, Mark D. Corner, P...