Sciweavers

4189 search results - page 674 / 838
» On the Security of Wireless Sensor Networks
Sort
View
ALGOSENSORS
2009
Springer
15 years 5 months ago
Building a Communication Bridge with Mobile Hubs
We study scenarios where mobile hubs are charged with building a communication bridge between two given points s and t. We introduce a new bi-criteria optimization problem where th...
Onur Tekdas, Yokesh Kumar, Volkan Isler, Ravi Jana...
ICDCSW
2006
IEEE
15 years 4 months ago
Fair Dice: A Tilt and Motion-Aware Cube with a Conscience
As an example of digital augmentation of a tiny object, a small cube-sized die is presented that perceives and records what face it rolls on. It is thus able to detect bias and co...
Kristof Van Laerhoven, Hans-Werner Gellersen
ICDCSW
2005
IEEE
15 years 4 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
COMPUTER
2004
80views more  COMPUTER 2004»
14 years 10 months ago
Radiation Detection with Distributed Sensor Networks
Given the heightened awareness and response to threats posed to national security, it is important to evaluate, and if possible, improve current measures being taken to ensure our...
Sean M. Brennan, Angela M. Mielke, David C. Torney...
SENSYS
2006
ACM
15 years 4 months ago
Scalable data aggregation for dynamic events in sensor networks
Computing and maintaining network structures for efficient data aggregation incurs high overhead for dynamic events where the set of nodes sensing an event changes with time. Mor...
Kai-Wei Fan, Sha Liu, Prasun Sinha