Sciweavers

4189 search results - page 707 / 838
» On the Security of Wireless Sensor Networks
Sort
View
COMSUR
2011
196views Hardware» more  COMSUR 2011»
13 years 10 months ago
From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols
—In large networks, a data source may not reach the intended sink in a single hop, thereby requiring the traffic to be routed via multiple hops. An optimized choice of such rout...
Thomas Watteyne, Antonella Molinaro, Maria Grazia ...
SECON
2007
IEEE
15 years 4 months ago
Experimental Investigation of IEEE 802.15.4 Transmission Power Control and Interference Minimization
Abstract—Although the characteristics of RF transmissions are physically well understood at the lowest levels of communication design, accurately incorporating power and interfer...
Steven Myers, Seapahn Megerian, Suman Banerjee, Mi...
PERCOM
2010
ACM
14 years 4 months ago
Local map generation using position and communication history of mobile nodes
In this paper, we propose an algorithm to estimate 2D shapes and positions of obstacles such as buildings using GPS and wireless communication history of mobile nodes. Our algorith...
Shinichi Minamimoto, Sae Fujii, Hirozumi Yamaguchi...
REALWSN
2010
14 years 4 months ago
An Experimental Study on IEEE 802.15.4 Multichannel Transmission to Improve RSSI-Based Service Performance
Abstract. In Wireless Sensor Networks (WSNs) the majority of the devices provide access to the Received Signal Strength Indicator (RSSI), which has been used as a means to enable d...
Andrea Bardella, Nicola Bui, Andrea Zanella, Miche...
ESAS
2004
Springer
15 years 3 months ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko