Sciweavers

4189 search results - page 551 / 838
» On the Security of Wireless Sensor Networks
Sort
View
GLOBECOM
2007
IEEE
15 years 5 months ago
Two Energy-Saving Schemes for Cooperative Transmission with Opportunistic Large Arrays
— An opportunistic large array (OLA) is a form of cooperative diversity in which a large group of simple, inexpensive relays or forwarding nodes operate without any mutual coordi...
Lakshmi V. Thanayankizil, Aravind Kailas, Mary Ann...
INFOCOM
2010
IEEE
14 years 9 months ago
Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System
— In multi-hop wireless networks, the mobile nodes usually act as routers to relay packets generated from other nodes. However, selfish nodes do not cooperate but make use of the...
Mohamed Elsalih Mahmoud, Xuemin Shen
ADHOCNOW
2010
Springer
15 years 21 days ago
Coverage-Adaptive Random Walks for Fast Sensory Data Collection
Random walks in wireless sensor networks can serve as fully local, very simple strategies for sink motion that reduce energy dissipation a lot but increase the latency of data coll...
Constantinos Marios Angelopoulos, Sotiris E. Nikol...
ACSAC
2007
IEEE
15 years 5 months ago
An Overview of the Annex System
This paper describes the security and network architecture of the Annex system, a family of technologies for secure and pervasive communication and information processing that we ...
Duncan A. Grove, Toby C. Murray, C. A. Owen, Chris...
ACSAC
2004
IEEE
15 years 3 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...