Sciweavers

2282 search results - page 55 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
150
Voted
EWSN
2007
Springer
16 years 3 months ago
RIDA: A Robust Information-Driven Data Compression Architecture for Irregular Wireless Sensor Networks
Abstract. In this paper, we propose and evaluate RIDA, a novel informationdriven architecture for distributed data compression in a sensor network, allowing it to conserve energy a...
Xuan Thanh Dang, Nirupama Bulusu, Wu-chi Feng
WISEC
2010
ACM
15 years 9 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
159
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks
Abstract—Ubiquitous network connectivity and mobile communications have recently attracted remarkable attention. Wireless multihop networks such as Mobile Ad hoc Networks or Wire...
Kalman Graffi, Parag S. Mogre, Matthias Hollick, R...
INFOCOM
2006
IEEE
15 years 10 months ago
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
DCOSS
2008
Springer
15 years 5 months ago
Decoding Code on a Sensor Node
Abstract. Wireless sensor networks come of age and start moving out of the laboratory into the field. As the number of deployments is increasing the need for an efficient and relia...
Pascal von Rickenbach, Roger Wattenhofer