Sciweavers

2282 search results - page 52 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ISPDC
2010
IEEE
15 years 2 months ago
A Distributed Wakening Based Target Tracking Protocol for Wireless Sensor Networks
We propose a two layer protocol for tracking fast targets in sensor networks. At the lower layer, the Distributed Spanning Tree Algorithm (DSTA) [12] partitions the network into c...
Aysegul Alaybeyoglu, Orhan Dagdeviren, Aylin Kanta...
UCS
2007
Springer
15 years 10 months ago
D-FLER - A Distributed Fuzzy Logic Engine for Rule-Based Wireless Sensor Networks
Abstract. We propose D-FLER, a distributed, general-purpose reasoning engine for WSN. D-FLER uses fuzzy logic for fusing individual and neighborhood observations, in order to produ...
Mihai Marin-Perianu, Paul J. M. Havinga
GIS
2010
ACM
15 years 2 months ago
Exploiting local node cache in top-k queries within wireless sensor networks
Top-k queries are a popular type of query in Wireless Sensor Networks. Typical solutions rely on coordinated root-tonodes and nodes-to-root messages and on maintaining filters at...
Johannes Niedermayer, Mario A. Nascimento, Matthia...
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Wireless Sensor Networks for Health Monitoring
We propose a platform for health monitoring using wireless sensor networks. Our platform is a new architecture called CustoMed that will reduce the customization and reconfigurat...
Roozbeh Jafari, Andre Encarnacao, Azad Zahoory, Fo...
INFOCOM
2006
IEEE
15 years 10 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya