Sciweavers

635 search results - page 17 / 127
» Evaluation of WiseMAC and extensions on wireless sensor node...
Sort
View
GPC
2007
Springer
15 years 3 months ago
Heterogeneous Wireless Sensor Network Deployment and Topology Control Based on Irregular Sensor Model
Heterogeneous wireless sensor network (heterogeneous WSN) consists of sensor nodes with different ability, such as different computing power and sensing range. Compared with homoge...
Chun-Hsien Wu, Yeh-Ching Chung
EWSN
2008
Springer
15 years 9 months ago
Typhoon: A Reliable Data Dissemination Protocol for Wireless Sensor Networks
We present Typhoon, a protocol designed to reliably deliver large objects to all the nodes of a wireless sensor network (WSN). Typhoon uses a combination of spatially-tuned timers,...
Chieh-Jan Mike Liang, Razvan Musaloiu-Elefteri, An...
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 9 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ICDCS
2005
IEEE
15 years 3 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
75
Voted
TWC
2008
80views more  TWC 2008»
14 years 9 months ago
Robust connectivity-aware energy-efficient routing for wireless sensor networks
In this paper, we consider a class of energy-aware routing algorithm that explicitly takes into account the connectivity of the remaining sensor network. In typical sensor network ...
Charles Pandana, K. J. Ray Liu