Sciweavers

2333 search results - page 40 / 467
» Power-aware Node Deployment in Wireless Sensor Networks
Sort
View
IJSNET
2006
145views more  IJSNET 2006»
14 years 9 months ago
RL-MAC: a reinforcement learning based MAC protocol for wireless sensor networks
:This paper introduces RL-MAC, a novel adaptive MediaAccess Control (MAC) protocol for Wireless Sensor Networks (WSN) that employs a reinforcement learning framework. Existing sche...
Zhenzhen Liu, Itamar Elhanany
WINET
2010
179views more  WINET 2010»
14 years 8 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
EWSN
2008
Springer
15 years 9 months ago
Typhoon: A Reliable Data Dissemination Protocol for Wireless Sensor Networks
We present Typhoon, a protocol designed to reliably deliver large objects to all the nodes of a wireless sensor network (WSN). Typhoon uses a combination of spatially-tuned timers,...
Chieh-Jan Mike Liang, Razvan Musaloiu-Elefteri, An...
VTC
2007
IEEE
15 years 4 months ago
Optimum Tree-Based Topologies for Multi-Sink Wireless Sensor Networks Using IEEE 802.15.4
— This paper investigates the topology formation mechanisms provided by IEEE 802.15.4 to create tree-based topologies, in the context of a multi-sink wireless sensor network. The...
Chiara Buratti, Francesca Cuomo, Sara Della Luna, ...
SNPD
2007
14 years 11 months ago
Detecting Compromised Nodes in Wireless Sensor Networks
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial ...
Mary Mathews, Min Song, Sachin Shetty, Rick McKenz...