Sciweavers

3517 search results - page 630 / 704
» Relay sensor placement in wireless sensor networks
Sort
View
PERCOM
2008
ACM
15 years 9 months ago
Topology Formation in IEEE 802.15.4: Cluster-Tree Characterization
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...
GLOBECOM
2010
IEEE
14 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
ICDCS
2011
IEEE
13 years 9 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
MOBIHOC
2003
ACM
15 years 9 months ago
Localization from mere connectivity
It is often useful to know the geographic positions of nodes in a communications network, but adding GPS receivers or other sophisticated sensors to every node can be expensive. W...
Yi Shang, Wheeler Ruml, Ying Zhang, Markus P. J. F...
PERCOM
2006
ACM
15 years 9 months ago
Dependability and Accountability for Context-aware Middleware Systems
In this paper we present a framework to provide dependability through accountability. Our proposal exploits the asymmetry present in the majority of sensor data processing to chea...
Andrew C. Rice, Alastair R. Beresford