Sciweavers

3426 search results - page 184 / 686
» Self-monitoring of wireless sensor networks
Sort
View
ICASSP
2011
IEEE
14 years 5 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
ISORC
2007
IEEE
15 years 8 months ago
LSynD: Localized Synopsis Diffusion
Wireless sensor networks represent an extremely fastgrowing emerging technology, but still suffer from several limitations. The state of the art in sensor networks focuses on opti...
Andreea Berfield, Panos K. Chrysanthis, Daniel Mos...
SIGMOD
2003
ACM
94views Database» more  SIGMOD 2003»
16 years 1 months ago
The sensor spectrum: technology, trends, and requirements
Though physical sensing instruments have long been used in astronomy, biology, and civil engineering, the recent emergence of wireless sensor networks and RFID has spurred a renai...
Joseph M. Hellerstein, Wei Hong, Samuel Madden
IPSN
2007
Springer
15 years 7 months ago
Underground structure monitoring with wireless sensor networks
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-...
Mo Li, Yunhao Liu
ESAS
2005
Springer
15 years 7 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...