Sciweavers

2189 search results - page 40 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
JPDC
2007
112views more  JPDC 2007»
14 years 9 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
GIS
2010
ACM
14 years 8 months ago
Exploiting local node cache in top-k queries within wireless sensor networks
Top-k queries are a popular type of query in Wireless Sensor Networks. Typical solutions rely on coordinated root-tonodes and nodes-to-root messages and on maintaining filters at...
Johannes Niedermayer, Mario A. Nascimento, Matthia...
MASS
2010
181views Communications» more  MASS 2010»
14 years 7 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Wireless Sensor Networks for Health Monitoring
We propose a platform for health monitoring using wireless sensor networks. Our platform is a new architecture called CustoMed that will reduce the customization and reconfigurat...
Roozbeh Jafari, Andre Encarnacao, Azad Zahoory, Fo...
SIGCOMM
2006
ACM
15 years 3 months ago
Interference-aware fair rate control in wireless sensor networks
In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dyna...
Sumit Rangwala, Ramakrishna Gummadi, Ramesh Govind...