Sciweavers

3426 search results - page 168 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
CCR
2008
90views more  CCR 2008»
15 years 4 months ago
Censor networks: a critique of "sensor networks" from a systems perspective
This writeup presents a critique of the field of "Wireless Sensor Networks (WSNs)". Literature in this domain falls into two main, distinct categories: (1) algorithms or...
Bhaskaran Raman, Kameswari Chebrolu
154
Voted
MOBIHOC
2001
ACM
16 years 3 months ago
Distributed assignment of encoded MAC addresses in sensor networks
In wireless sensor networks, the vast majority of wide-scale traffic consists of only a few bytes, including all network and application layer IDs. Therefore, MAC addresses, which...
Curt Schurgers, Gautam Kulkarni, Mani B. Srivastav...
IEEEIAS
2008
IEEE
15 years 10 months ago
Network Level Privacy for Wireless Sensor Networks
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network leve...
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Aurio...
ADHOCNOW
2006
Springer
15 years 9 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
107
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
Design of a QoS-Aware Routing Mechanism for Wireless Multimedia Sensor Networks
—In wireless sensor networks, majority of routing protocols considered energy efficiency as the main objective and assumed data traffic with unconstrained delivery requirements...
Md. Abdul Hamid, Muhammad Mahbub Alam, Choong Seon...