Sciweavers

3426 search results - page 283 / 686
» Self-monitoring of wireless sensor networks
Sort
View
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 2 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
94
Voted
EWSN
2009
Springer
16 years 2 months ago
A Better Choice for Sensor Sleeping
Sensor sleeping is a widely-used and cost-effective technique to save energy in wireless sensor networks. Protocols at different stack levels can, either individually or simultaneo...
Ou Yang, Wendi Rabiner Heinzelman
INFOCOM
2005
IEEE
15 years 7 months ago
Power aware routing for sensor databases
— Wireless sensor networks offer the potential to span and monitor large geographical areas inexpensively. Sensor network databases like TinyDB [1] are the dominant architectures...
Chiranjeeb Buragohain, Divyakant Agrawal, Subhash ...
NETCOOP
2009
Springer
15 years 8 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
IPSN
2005
Springer
15 years 7 months ago
Statistical model of lossy links in wireless sensor networks
Abstract— Recently, several wireless sensor network studies demonstrated large discrepancies between experimentally observed communication properties and properties produced by w...
Alberto Cerpa, Jennifer L. Wong, Louane Kuang, Mio...