Sciweavers

483 search results - page 11 / 97
» On extracting consistent graphs in wireless sensor networks
Sort
View
EMSOFT
2005
Springer
15 years 6 months ago
Rialto: a bridge between description and implementation of control algorithms for wireless sensor networks
Rialto is a design framework that allows separating the description of a control application for wireless sensor networks from its physical network implementation. The methodology...
Alvise Bonivento, Luca P. Carloni, Alberto L. Sang...
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 8 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
EJWCN
2010
237views more  EJWCN 2010»
14 years 8 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
MOBIWAC
2006
ACM
15 years 7 months ago
Quick convergecast in ZigBee/IEEE 802.15.4 tree-based wireless sensor networks
Convergecast is a fundamental operation in wireless sensor networks. Existing convergecast solutions have focused on reducing latency and energy consumption. However, a good desig...
Yu-Chee Tseng, Meng-Shiuan Pan
ADHOCNOW
2004
Springer
15 years 6 months ago
Adaptive Probing and Communication in Sensor Networks
Sensor networks consist of multiple low-cost, autonomous, ad-hoc sensors, that periodically probe and react to the environment and communicate with other sensors or devices. A prim...
Iftach Ragoler, Yossi Matias, Nimrod Aviram