Sciweavers

2924 search results - page 72 / 585
» Modeling Data Consistency in Wireless Sensor Networks
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 10 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
EUROPAR
2007
Springer
15 years 10 months ago
Securing Sensor Reports in Wireless Sensor Networks*
Abstract. The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and ...
Al-Sakib Khan Pathan, Choong Seon Hong
EMSOFT
2005
Springer
15 years 9 months ago
Rialto: a bridge between description and implementation of control algorithms for wireless sensor networks
Rialto is a design framework that allows separating the description of a control application for wireless sensor networks from its physical network implementation. The methodology...
Alvise Bonivento, Luca P. Carloni, Alberto L. Sang...
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 11 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
ISCC
2006
IEEE
112views Communications» more  ISCC 2006»
15 years 10 months ago
The Precision and Energetic Cost of Snapshot Estimates in Wireless Sensor Networks
— Even for a specific application, the design space of wireless sensor networks is enormous, and traditional disciplinary boundaries are disappearing in the search for efficien...
Paul G. Flikkema