Sciweavers

2282 search results - page 91 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
MONET
2006
173views more  MONET 2006»
15 years 4 months ago
Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks
We analyze an architecture based on mobility to address the problem of energy efficient data collection in a sensor network. Our approach exploits mobile nodes present in the senso...
Sushant Jain, Rahul Shah, Waylon Brunette, Gaetano...
COMCOM
2007
129views more  COMCOM 2007»
15 years 4 months ago
Mobile object tracking in wireless sensor networks
— Wireless sensor network is an emerging technology that enables remote monitoring objects and environment. This paper proposes a protocol to track a mobile object in a sensor ne...
Hua-Wen Tsai, Chih-Ping Chu, Tzung-Shi Chen
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 4 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
INFOCOM
2002
IEEE
15 years 9 months ago
Bounding the Lifetime of Sensor Networks Via Optimal Role Assignments
— A key challenge in ad-hoc, data-gathering wireless sensor networks is achieving a lifetime of several years using nodes that carry merely hundreds of joules of stored energy. I...
Manish Bhardwaj, Anantha Chandrakasan
INFOCOM
2006
IEEE
15 years 10 months ago
Is Deterministic Deployment Worse than Random Deployment for Wireless Sensor Networks?
— Before a sensor network is deployed, it is important to determine how many sensors are required to achieve a certain coverage degree. The number of sensor required for maintain...
Honghai Zhang, Jennifer C. Hou