Sciweavers

4189 search results - page 552 / 838
» On the Security of Wireless Sensor Networks
Sort
View
SASO
2008
IEEE
15 years 5 months ago
WSN and P2P: A Self-Managing Marriage
Wireless sensor networks are designed for a very wide, yet specific, purpose. Their components have processing and power limitations. Due to these limitations, decisions by runni...
Gustavo Gutierrez, Boris Mejías, Peter Van ...
TCOM
2008
120views more  TCOM 2008»
14 years 11 months ago
Network Coding for Efficient Multicast Routing in Wireless Ad-hoc Networks
Network coding is a powerful coding technique that has been proved to be very effective in achieving the maximum multicast capacity. It is especially suited for new emerging networ...
Jingyao Zhang, Pingyi Fan, Khaled Ben Letaief
GLOBECOM
2009
IEEE
15 years 3 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
ALGOSENSORS
2009
Springer
15 years 5 months ago
Near-Optimal Radio Use for Wireless Network Synchronization
In this paper we consider the model of communication where wireless devices can either switch their radios off to save energy (and hence, can neither send nor receive messages), o...
Milan Bradonjic, Eddie Kohler, Rafail Ostrovsky
EWSN
2011
Springer
14 years 2 months ago
A Mobility Management Framework for Optimizing the Trajectory of a Mobile Base-Station
Abstract. We describe a software framework for prescribing the trajectory path of a mobile sink in a wireless sensor network under an extensible set of optimization criteria. The f...
Madhu Mudigonda, Trisul Kanipakam, Adam Dutko, Man...