Sciweavers

810 search results - page 83 / 162
» Security Issues in Wireless Sensor Networks
Sort
View
NETWORK
2007
234views more  NETWORK 2007»
15 years 3 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 11 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
191
Voted
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 10 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
VTC
2006
IEEE
138views Communications» more  VTC 2006»
15 years 10 months ago
Simulated Annealing based Wireless Sensor Network Localization with Flip Ambiguity Mitigation
Abstract— Accurate self-localization capability is highly desirable in wireless sensor networks. A major problem in wireless sensor network localization is the flip ambiguity, w...
Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic
ICC
2007
IEEE
177views Communications» more  ICC 2007»
15 years 10 months ago
An Energy-Aware Protocol for Data Gathering Applications in Wireless Sensor Networks
—Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energ...
Ming Liu, Yuan Zheng, Jiannong Cao, Guihai Chen, L...