Sciweavers

459 search results - page 34 / 92
» Secure sensor network routing: a clean-slate approach
Sort
View
TON
2010
147views more  TON 2010»
14 years 11 months ago
Coverage-time optimization for clustered wireless sensor networks: a power-balancing approach
—In this paper, we investigate the maximization of the coverage time for a clustered wireless sensor network (WSN) by optimal balancing of power consumption among cluster heads (...
Tao Shu, Marwan Krunz
101
Voted
IEEEARES
2009
IEEE
15 years 7 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
ADHOC
2008
111views more  ADHOC 2008»
15 years 19 days ago
MERLIN: Cross-layer integration of MAC and routing for low duty-cycle sensor networks
Sensor network MAC protocols typically sacrifice packet latency to achieve energy efficiency. Such delays may well increase due to routing protocol operation. For this reason it i...
Antonio G. Ruzzelli, Gregory M. P. O'Hare, Raja Ju...
97
Voted
ITNG
2007
IEEE
15 years 6 months ago
Securing MPLS Networks with Multi-path Routing
— MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services su...
Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal
93
Voted
INFOCOM
2005
IEEE
15 years 6 months ago
GPS free coordinate assignment and routing in wireless sensor networks
— In this paper we consider the problem of constructing a coordinate system in a sensor network where location information is not available. To this purpose we introduce the Virt...
Antonio Caruso, Stefano Chessa, Swades De, A. Urpi