Sciweavers

3426 search results - page 204 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
SENSYS
2005
ACM
15 years 9 months ago
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
— In this paper, we propose a dynamic en-route filtering scheme for false data injection attacks in wireless sensor networks. In sensor networks, adversaries can inject false da...
Zhen Yu, Yong Guan
ICICS
2010
Springer
15 years 2 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
ISCAS
2005
IEEE
161views Hardware» more  ISCAS 2005»
15 years 9 months ago
A traffic aware, energy efficient MAC protocol for wireless sensor networks
— In this paper, we focus on the problem of designing an energy efficient MAC protocol for wireless sensor networks and propose a novel scheme, named as TEEM (Traffic aware, Ener...
Changsu Suh, Young-Bae Ko
REALWSN
2010
15 years 2 months ago
Motes in the Jungle: Lessons Learned from a Short-Term WSN Deployment in the Ecuador Cloud Forest
We study the characteristics of the communication links of a wireless sensor network in a tropical cloud forest in Ecuador, in the context of a wildlife monitoring application. Thi...
Matteo Ceriotti, Matteo Chini, Amy L. Murphy, Gian...
581
Voted

Presentation
945views
13 years 10 months ago
A Decentralized Method for Maximizing k-coverage Lifetime in WSNs
In this paper, we propose a decentralized method for maximizing lifetime of data collection wireless sensor networks (WSNs) by making minimal number of nodes operate and putting ot...