Sciweavers

2282 search results - page 56 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
138
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
— When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the compromised nodes to inject false sensing reports or modi...
Wensheng Zhang, Guohong Cao
136
Voted
CORR
2010
Springer
205views Education» more  CORR 2010»
15 years 2 months ago
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
—Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications. These networks have the pot...
Jaydip Sen, Kaustav Goswami
INFOCOM
2010
IEEE
15 years 2 months ago
Understanding Node Localizability of Wireless Ad-hoc Networks
— Location awareness is highly critical for wireless ad-hoc and sensor networks. Many efforts have been made to solve the problem of whether or not a network can be localized. Ne...
Zheng Yang, Yunhao Liu
EWSN
2007
Springer
16 years 3 months ago
Model-Based Design Exploration of Wireless Sensor Node Lifetimes
This paper presents two lifetime models that describe two of the most common modes of operation of sensor nodes today, triggerdriven and duty-cycle driven. The models use a set of ...
Deokwoo Jung, Thiago Teixeira, Andrew Barton-Sween...
ACISICIS
2007
IEEE
15 years 10 months ago
A Comparative Study on the Performance of Wireless Sensor Networks
To increase the lifetime of the sensor networks, a recognized method is to switch off/on some sensor nodes between “sleep” and “activity” mode in order to save the energy....
Lin Zou, Zhongwei Zhang