Sciweavers

3426 search results - page 117 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
127
Voted
MOBIWAC
2006
ACM
15 years 9 months ago
Quick convergecast in ZigBee/IEEE 802.15.4 tree-based wireless sensor networks
Convergecast is a fundamental operation in wireless sensor networks. Existing convergecast solutions have focused on reducing latency and energy consumption. However, a good desig...
Yu-Chee Tseng, Meng-Shiuan Pan
COMCOM
2007
142views more  COMCOM 2007»
15 years 3 months ago
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environm...
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang...
129
Voted
CONEXT
2006
ACM
15 years 9 months ago
Neighbor discovery analysis in wireless sensor networks
In wireless sensor networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic mo...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
GLOBECOM
2008
IEEE
15 years 10 months ago
Mesh-Based Coverage for Wireless Sensor Networks
—Wireless Sensor Networks (WSNs) consist of spatially-distributed autonomous sensors that can cooperatively monitor physical and environmental conditions. Because of sensors’ r...
Jiong Wang, Sirisha Medidi
144
Voted
DCOSS
2006
Springer
15 years 7 months ago
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Yawen Wei, Zhen Yu, Yong Guan