Sciweavers

189 search results - page 4 / 38
» Is Deterministic Deployment Worse than Random Deployment for...
Sort
View
JSAC
2010
188views more  JSAC 2010»
13 years 1 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
PERCOM
2009
ACM
14 years 1 months ago
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
WCNC
2010
IEEE
13 years 10 months ago
Deploying Wireless Sensors for Differentiated Coverage and Probabilistic Connectivity
—The deployment strategy for achieving differentiated coverage and probabilistic connectivity in wireless sensor networks is studied in this paper. A novel solution based on elit...
Yanjun Li, Ye-Qiong Song, Yi-hua Zhu, René ...
INFOCOM
2005
IEEE
13 years 12 months ago
Packetostatics: deployment of massively dense sensor networks as an electrostatics problem
— We investigate the spatial distribution of wireless nodes that can transport a given volume of traffic in a sensor network, while requiring the minimum number of wireless node...
Stavros Toumpis, Leandros Tassiulas
INFOCOM
2006
IEEE
14 years 9 days ago
Analyzing the Energy-Latency Trade-Off During the Deployment of Sensor Networks
— The inherent trade-off between energy-efficiency and rapidity of event dissemination is characteristic for wireless sensor networks. Scarcity of energy renders it necessary fo...
Thomas Moscibroda, Pascal von Rickenbach, Roger Wa...