Sciweavers

3426 search results - page 201 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 10 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
JMS
2007
151views more  JMS 2007»
15 years 4 months ago
Wireless Body Sensor Network Using Medical Implant Band
A wireless body sensor network hardware has been designed and implemented based on MICS (Medical Implant Communication Service) band. The MICS band offers the advantage of miniatur...
Mehmet R. Yuce, Steven W. P. Ng, Naung L. Myo, Jam...
IPSN
2009
Springer
15 years 11 months ago
On hierarchical routing in wireless sensor networks
Hierarchical routing is a promising approach for point-topoint routing with very small routing state. While there are many theoretical analyses and high-level simulations demonstr...
Konrad Iwanicki, Maarten van Steen
SSS
2009
Springer
209views Control Systems» more  SSS 2009»
15 years 10 months ago
CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks
Real-time performance is critical for many time-sensitive applications of wireless sensor networks. We present a constrained flooding protocol, called CFlood that enhances the dea...
Bo Jiang, Binoy Ravindran, Hyeonjoong Cho
SUTC
2006
IEEE
15 years 10 months ago
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have ...
Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, ...