Sciweavers

2282 search results - page 422 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
TMC
2012
13 years 4 months ago
Elevator-Assisted Sensor Data Collection for Structural Health Monitoring
—Sensor networks nowadays are widely used for structural health monitoring; for example, the sensor monitoring system deployed on the Guangzhou New TV Tower, China. While wired s...
Tao Zhang, Dan Wang, Jiannong Cao, Yi Qing Ni, Lij...
114
Voted
CODES
2008
IEEE
15 years 8 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
MOBIHOC
2005
ACM
16 years 1 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
ICNP
2007
IEEE
15 years 8 months ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
GLOBECOM
2009
IEEE
15 years 5 months ago
Multi-Frame Distributed Protocol for Analog Network Coding in Slow-Fading Channels
The wireless network scenario here is based on N users that communicate one with the others through a central relay node by adopting the Analog Network Coding (ANC) paradigm. In th...
Jonathan Gambini, Umberto Spagnolini