Sciweavers

3887 search results - page 427 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
ICDCSW
2005
IEEE
15 years 10 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
ICMCS
2005
IEEE
87views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Performance of Multiple Description Coding in Sensor Networks with Finite Buffers
Sensor networks are usually dense networks where the network diversity can be exploited in order to overcome failures. In this paper, we study the use of multiple description tech...
Enrico Baccaglini, Guillermo Barrenetxea, Baltasar...
WINET
2002
101views more  WINET 2002»
15 years 4 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
IPPS
2008
IEEE
15 years 11 months ago
Mobility control schemes with quick convergence in wireless sensor networks
In the near future, wireless sensor networks (WSN) performing sensing and communication tasks will be widely deployed as technology rapidly advances. Communication is one of the e...
Xiao Chen, Zhen Jiang, Jie Wu
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 4 months ago
A stochastic analysis of greedy routing in a spatially-dependent sensor network
For a sensor network, as tractable spatially-dependent node deployment model is presented with the property that the density is inversely proportional to the sink distance. A stoc...
H. Paul Keeler