Sciweavers

3426 search results - page 617 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 6 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
EJWCN
2010
237views more  EJWCN 2010»
14 years 6 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
DCOSS
2009
Springer
15 years 3 months ago
MCP: An Energy-Efficient Code Distribution Protocol for Multi-Application WSNs
In this paper, we study the code distribution problem in multi-application wireless sensor networks (MA-WSNs), i.e., sensor networks that can support multiple applications. While M...
Weijia Li, Youtao Zhang, Bruce Childers
ATAL
2008
Springer
15 years 1 months ago
Simulation of sensor-based tracking in Second Life
This paper describes "Second Life" as a novel type of testbed and simulation environment for sensor-based applications. Second Life is a popular virtual online world tha...
Boris Brandherm, Sebastian Ullrich, Helmut Prendin...
ITIIS
2010
154views more  ITIIS 2010»
14 years 6 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An