Sciweavers

736 search results - page 17 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
SAINT
2008
IEEE
15 years 4 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki
109
Voted
ISCC
2009
IEEE
254views Communications» more  ISCC 2009»
15 years 4 months ago
Monitoring connectivity in wireless sensor networks
It is important to have continuous connectivity in a wireless sensor network after it is deployed in a hostile environment. However, such networks are constrained by the low usert...
Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, Da...
ICC
2007
IEEE
188views Communications» more  ICC 2007»
15 years 4 months ago
Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks
—In our previous work [11], we derived detection delay and detection probability for a randomized scheduling algorithm in wireless sensor networks. In this paper, we study asympt...
Yang Xiao, Ying Zhang, Xinyu Sun, Hui Chen
IWNAS
2008
IEEE
15 years 4 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
RTSS
2003
IEEE
15 years 2 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son