Sciweavers

3887 search results - page 301 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
128
Voted
IJNSEC
2007
171views more  IJNSEC 2007»
15 years 3 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
GLOBECOM
2010
IEEE
15 years 1 months ago
Statistical Framework for Source Anonymity in Sensor Networks
In this work, we investigate the security of anonymous wireless sensor networks. To lay down the foundations of a formal framework, we propose a new model for analyzing and evalua...
Basel Alomair, Andrew Clark, Jorge Cuéllar,...
ICC
2007
IEEE
203views Communications» more  ICC 2007»
15 years 10 months ago
Distributed Data Aggregation Using Clustered Slepian-Wolf Coding in Wireless Sensor Networks
—Slepian-Wolf coding is a promising distributed source coding technique that can completely remove the data redundancy caused by the spatially correlated observations in wireless...
Pu Wang, Cheng Li, Jun Zheng
PERCOM
2010
ACM
15 years 2 months ago
Resilient image sensor networks in lossy channels using compressed sensing
—Data loss in wireless communications greatly affects the reconstruction quality of a signal. In the case of images, data loss results in a reduction in quality of the received i...
Scott Pudlewski, Arvind Prasanna, Tommaso Melodia
COMCOM
2011
14 years 10 months ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...