Sciweavers

2099 search results - page 218 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
MOBIHOC
2009
ACM
15 years 11 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
INFOCOM
2006
IEEE
15 years 4 months ago
Achieving Repeatability of Asynchronous Events in Wireless Sensor Networks with EnviroLog
— Sensing events from dynamic environments are normally asynchronous and non-repeatable. This lack of repeatability makes it particularly difficult to statistically evaluate the...
Liqian Luo, Tian He, Gang Zhou, Lin Gu, Tarek F. A...
IPSN
2005
Springer
15 years 4 months ago
A compact modular wireless sensor platform
— We have designed and constructed a modular platform for use in compact wireless sensing. This platform is based around a series of circuit boards (or panes), each of which inst...
Ari Y. Benbasat, Joseph A. Paradiso
EWSN
2007
Springer
15 years 10 months ago
Model-Based Design Exploration of Wireless Sensor Node Lifetimes
This paper presents two lifetime models that describe two of the most common modes of operation of sensor nodes today, triggerdriven and duty-cycle driven. The models use a set of ...
Deokwoo Jung, Thiago Teixeira, Andrew Barton-Sween...
ENTCS
2008
390views more  ENTCS 2008»
14 years 9 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel