Sciweavers

4189 search results - page 658 / 838
» On the Security of Wireless Sensor Networks
Sort
View
ICC
2009
IEEE
142views Communications» more  ICC 2009»
15 years 5 months ago
Localized Sensor Self-Deployment for Guaranteed Coverage Radius Maximization
—Focused coverage is defined as the coverage of a wireless sensor network surrounding a point of interest (POI), and is measured by coverage radius, i.e., minimum distance from ...
Xu Li, Hannes Frey, Nicola Santoro, Ivan Stojmenov...
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
14 years 9 months ago
A general Gaussian-mixture approach for range-only mapping using multiple hypotheses
— Radio signal-based localization and mapping is becoming more interesting as applications involving the collaboration between robots and static wireless devices are more common....
Fernando Caballero, Luis Merino, Aníbal Oll...
PERCOM
2008
ACM
15 years 10 months ago
Topology Formation in IEEE 802.15.4: Cluster-Tree Characterization
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...
MOBIHOC
2003
ACM
15 years 10 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
ICDCS
2011
IEEE
13 years 10 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu