Sciweavers

2189 search results - page 60 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
SECON
2007
IEEE
15 years 4 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
AOSD
2007
ACM
15 years 1 months ago
Declarative failure recovery for sensor networks
Wireless sensor networks consist of a system of distributed sensors embedded in the physical world, and promise to allow observation of previously unobservable phenomena. Since th...
Ramakrishna Gummadi, Nupur Kothari, Todd D. Millst...
SASN
2004
ACM
15 years 3 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
IPCCC
2005
IEEE
15 years 3 months ago
MMAC: a mobility-adaptive, collision-free MAC protocol for wireless sensor networks
Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor no...
Muneeb Ali, T. Suleman, Zartash Afzal Uzmi
ICIP
2010
IEEE
14 years 7 months ago
GAME-theory-based cross-layer optimization for wireless DS-CDMA visual sensor networks
We propose a game-theory-based cross-layer optimization scheme for wireless Direct Sequence Code Division Multiple Access (DSCDMA) visual sensor networks. The scheme uses the Nash...
Lisimachos P. Kondi, Elizabeth S. Bentley