Sciweavers

736 search results - page 83 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Optimal multiple-coverage of sensor networks
—In wireless sensor networks, multiple-coverage, in which each point is covered by more than one sensor, is often required to improve detection quality and achieve high fault tol...
Xiaole Bai, Ziqiu Yun, Dong Xuan, Biao Chen, Wei Z...
IPSN
2003
Springer
15 years 3 months ago
Sentry-Based Power Management in Wireless Sensor Networks
This paper presents a sentry-based approach to power management in wireless sensor networks for applications such as intruder detection and tracking. To minimize average power cons...
Jonathan Hui, Zhiyuan Ren, Bruce H. Krogh
EMNETS
2007
15 years 1 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 4 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
15 years 2 months ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...