Sciweavers

431 search results - page 15 / 87
» Perimeter-Based Data Replication in Mobile Sensor Networks
Sort
View
IPPS
2006
IEEE
15 years 5 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
ESAS
2007
Springer
15 years 3 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
GLOBECOM
2008
IEEE
15 years 6 months ago
Modeling Mobility-Assisted Data Collection in Wireless Sensor Networks
—Exploiting mobility to enhance the performance of wireless sensor networks (WSNs), in terms of connectivity, coverage, and lifetime elongation, has recently been the focus of se...
Hisham M. Almasaeid, Ahmed E. Kamal
CORR
2004
Springer
142views Education» more  CORR 2004»
14 years 11 months ago
Dynamic Localization Protocols for Mobile Sensor Networks
The ability of a sensor node to determine its physical location within a network (Localization) is of fundamental importance in sensor networks. Interpretating data from sensors i...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
MDM
2005
Springer
117views Communications» more  MDM 2005»
15 years 5 months ago
Tuning query performance in mobile sensor databases
In this paper we propose a query-driven approach for tuning the time/energy trade-off in sensor networks with mobile sensors. The tuning factors include re-positioning of mobile s...
Vladimir Zadorozhny, Divyasheel Sharma, Prashant K...