Sciweavers

3887 search results - page 405 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
SASN
2006
ACM
15 years 10 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia
EWSN
2012
Springer
14 years 15 days ago
On the Optimal Blacklisting Threshold for Link Selection in Wireless Sensor Networks
Empirical studies on link blacklisting show that the delivery rate is very sensitive to the calibration of the blacklisting threshold. If the calibration is too restrictive (the th...
Flavio Fabbri, Marco Zuniga, Daniele Puccinelli, P...
MOBIHOC
2004
ACM
16 years 4 months ago
Internal synchronization of drift-constraint clocks in ad-hoc sensor networks
Clock synchronization is a crucial basic service in typical sensor networks, since the observations of distributed sensors more often than not need to be ordered ("a happened...
Lennart Meier, Philipp Blum, Lothar Thiele
ESAS
2004
Springer
15 years 10 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
APNOMS
2007
Springer
15 years 8 months ago
Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel H...