Sciweavers

1551 search results - page 17 / 156
» Privacy-Preserving Network Aggregation
Sort
View
143 views 133 votes 15 years 8 months ago  SASN 2004»
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
97 views 109 votes 15 years 7 months ago  ICNP 1998»
We investigate the preservation of quality of service guarantees to a flow of packets in the presence of flow aggregation. In flow aggregation, multiple flows, known as the consti...
147 views 117 votes 14 years 9 months ago  IJDSN 2010»
In this paper, we introduce PANEL, a position-based aggregator node election protocol for wireless sensor networks. The novelty of PANEL with respect to other aggregator node elec...
228 views 156 votes 15 years 9 months ago  VTC 2006»
Abstract— This paper proposes and evaluates a new aggregation algorithm in wireless sensor networks with time constraint. In the proposed algorithm, each aggregation node control...
182 views 124 votes 13 years 10 months ago  CORR 2012»
As the number of computing devices embedded into engineered systems continues to rise, there is a widening gap between the needs of the user to control aggregates of devices and t...
90 views 108 votes 15 years 7 months ago  ICNP 1999»
We investigate the preservation of quality of service guarantees to a flow of packets in the presence of flow aggregation. For efficiency, multiple flows, known as the constituent...
487 views 253 votes 13 years 5 months ago  TKDE 2012»
—Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of som...
165 views 113 votes 15 years 9 months ago  IPPS 2008»
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
233 views 157 votes 15 years 9 months ago  PEWASUN 2006»
We present an algorithm implementing the failure detector class omega (Ω) in the crash-recovery model to coordinate data aggregation in wireless sensor networks. In order to mini...
261 views 117 votes 15 years 9 months ago  IPPS 2006»
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...