Sciweavers

4189 search results - page 611 / 838
» On the Security of Wireless Sensor Networks
Sort
View
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
GLOBECOM
2010
IEEE
14 years 9 months ago
Equitable Energy Consumption during Repeated Transmissions in a Multihop Wireless Network
This paper addresses the issue of network life during repeated broadcasts originating from the same source in large, strip-shaped wireless sensor networks. The proposed technique w...
Aravind Kailas, Mary Ann Ingram
IPSN
2010
Springer
15 years 5 months ago
Distributed estimation of linear acceleration for improved accuracy in wireless inertial motion capture
Motion capture using wireless inertial measurement units (IMUs) has many advantages over other techniques. Achieving accurate tracking with IMUs presents a processing challenge, e...
A. D. Young, M. J. Ling, D. K. Arvind
WIOPT
2006
IEEE
15 years 5 months ago
A general probabilistic model for improving key assignment in wireless networks
Abstract— We study the problem of establishing secure communication channels in resource-constrained wireless networks using key predistribution. Pairwise communication channels ...
Patrick Tague, Radha Poovendran
PODC
2004
ACM
15 years 4 months ago
Computation in networks of passively mobile finite-state sensors
We explore the computational power of networks of small resource-limited mobile agents. We define two new models of computation based on pairwise interactions of finite-state ag...
Dana Angluin, James Aspnes, Zoë Diamadi, Mich...