Sciweavers

2282 search results - page 425 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
EJWCN
2010
237views more  EJWCN 2010»
14 years 8 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
IPCCC
2007
IEEE
15 years 8 months ago
Optimal Cluster Head Selection in the LEACH Architecture
LEACH (Low Energy Adaptive Clustering Hierarchy) [1] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA ...
Haiming Yang, Biplab Sikdar
MOBISYS
2008
ACM
16 years 1 months ago
Peopletones: a system for the detection and notification of buddy proximity on mobile phones
Mobile phones have the potential to be useful agents for their owners by detecting and reporting situations that are of interest. Several challenges emerge in the case of detectin...
Kevin A. Li, Timothy Sohn, Steven Huang, William G...
116
Voted
NTMS
2008
IEEE
15 years 8 months ago
An Autonomous Data Gathering Scheme Adaptive to Sensing Requirements for Industrial Environment Monitoring
—In wireless sensor networks (WSNs), the frequency of sensing and data gathering depends on application requirements and surrounding conditions. In this paper, we propose a data ...
Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murat...
COMCOM
2006
120views more  COMCOM 2006»
15 years 1 months ago
Energy efficient routing and scheduling for real-time data aggregation in WSNs
In this paper, we study the problem of constructing an energy efficient data aggregation tree for data gathering in wireless sensor networks. We consider a real-time scenario wher...
Hongwei Du, Xiaodong Hu, Xiaohua Jia