Sciweavers

634 search results - page 46 / 127
» Secure time synchronization service for sensor networks
Sort
View
GLOBECOM
2009
IEEE
15 years 1 months ago
Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks
Many existing pairwise key establishment in sensor networks were developed based on the polynomial-based method. However, this method cannot offer the basic authentication function...
Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, Wen-Ch...
KIVS
2001
Springer
15 years 2 months ago
Real-Time Support on Top of Ethernet
Ethernet is a widely used low-cost networking technology. It however lacks the determinism and resource management features needed to meet realtime requirements of multimedia appli...
Rainer Koster, Thorsten Kramp
INFOCOM
2011
IEEE
14 years 1 months ago
Delay-bounded MAC with minimal idle listening for sensor networks
—This paper presents a new receiver-initiated sensor network MAC protocol, called CyMAC, which has the following unique features. It reduces the idle listening time of sensor nod...
Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang
ICC
2007
IEEE
245views Communications» more  ICC 2007»
15 years 4 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
ESAS
2004
Springer
15 years 1 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...