Sciweavers

4189 search results - page 663 / 838
» On the Security of Wireless Sensor Networks
Sort
View
IPPS
2005
IEEE
15 years 4 months ago
On Constructing k-Connected k-Dominating Set in Wireless Networks
An important problem in wireless networks, such as wireless ad hoc and sensor networks, is to select a few nodes to form a virtual backbone that supports routing and other tasks s...
Fei Dai, Jie Wu
INFOCOM
2011
IEEE
14 years 2 months ago
Connected coverage in wireless networks with directional antennas
—In this paper, we address a new unexplored problem - what are the optimal patterns to achieve connected coverage in wireless networks with directional antennas. As their name im...
Zuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weiji...
DCOSS
2006
Springer
15 years 2 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
ICIP
2002
IEEE
16 years 8 days ago
SPIN-IT: a data centric routing protocol for image retrieval in wireless networks
In this paper, we propose and analyze a routing protocol for mobile ad hoc networks that supports efficient image retrieval based on metadata queries. In digital photography, meta...
Edward Woodrow, Wendi Rabiner Heinzelman
MOBIQUITOUS
2007
IEEE
15 years 5 months ago
A Low-delay Protocol for Multihop Wireless Body Area Networks
—Wireless Body Area Networks (WBANs) form a new and interesting area in the world of remote health monitoring. An important concern in such networks is the communication between ...
Benoît Latré, Bart Braem, Ingrid Moer...