Sciweavers

3426 search results - page 617 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 10 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
EJWCN
2010
237views more  EJWCN 2010»
14 years 10 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
DCOSS
2009
Springer
15 years 7 months ago
MCP: An Energy-Efficient Code Distribution Protocol for Multi-Application WSNs
In this paper, we study the code distribution problem in multi-application wireless sensor networks (MA-WSNs), i.e., sensor networks that can support multiple applications. While M...
Weijia Li, Youtao Zhang, Bruce Childers
114
Voted
ATAL
2008
Springer
15 years 5 months ago
Simulation of sensor-based tracking in Second Life
This paper describes "Second Life" as a novel type of testbed and simulation environment for sensor-based applications. Second Life is a popular virtual online world tha...
Boris Brandherm, Sebastian Ullrich, Helmut Prendin...
ITIIS
2010
154views more  ITIIS 2010»
14 years 10 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An