Sciweavers

736 search results - page 69 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
TMC
2012
13 years 5 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
ALGOSENSORS
2010
Springer
14 years 8 months ago
Monitoring Churn in Wireless Networks
Wireless networks often experience a significant amount of churn, the arrival and departure of nodes. In this paper we propose a distributed algorithm for single-hop networks that...
Stephan Holzer, Yvonne Anne Pignolet, Jasmin Smula...
MIDDLEWARE
2007
Springer
15 years 3 months ago
A node discovery service for partially mobile sensor networks
Wireless Sensor Networks (WSNs) are challenging types of networks where resources can be scarce. In particular, battery is often a very limited resource and the radio interface is...
Vladimir Dyo, Cecilia Mascolo
INFOCOM
2009
IEEE
15 years 4 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang
KES
2008
Springer
14 years 9 months ago
Early Forest Fire Detection with Sensor Networks: Sliding Window Skylines Approach
Wireless sensor networks are widely used in environmental applications, like forest fire detection. Although forest fires occur relatively rarely, their number is increasing in Eur...
Kresimir Pripuzic, Hrvoje Belani, Marin Vukovic