Sciweavers

2129 search results - page 111 / 426
» Reliability of Wireless Sensor Network with Sleeping Nodes
Sort
View
ICDCS
2008
IEEE
15 years 4 months ago
Sensor Node Localization Using Uncontrolled Events
Many event-driven localization methods have been proposed as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately...
Ziguo Zhong, Dan Wang, Tian He
MOBIHOC
2007
ACM
15 years 9 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
PERCOM
2006
ACM
15 years 9 months ago
Authenticated Query Flooding in Sensor Networks
Abstract. We propose a novel mechanism for authentication of queries in a sensor network in case these queries are flooded. In our protocol, the base station appends an authenticat...
Zinaida Benenson, Lexi Pimenidis, Felix C. Freilin...
PEWASUN
2006
ACM
15 years 4 months ago
Revisiting neighbor discovery with interferences consideration
In wireless multi-hop networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
SENSYS
2005
ACM
15 years 3 months ago
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
— In this paper, we propose a dynamic en-route filtering scheme for false data injection attacks in wireless sensor networks. In sensor networks, adversaries can inject false da...
Zhen Yu, Yong Guan