Sciweavers

5813 search results - page 257 / 1163
» Sensor Networks
Sort
View
EMNETS
2007
15 years 8 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic
INFOCOM
2006
IEEE
15 years 10 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
INFOCOM
2007
IEEE
15 years 11 months ago
Oblivious Routing with Mobile Fusion Centers over a Sensor Network
— We consider the problem of aggregating data at a mobile fusion center (fusor) (eg. a PDA or a cellular phone) moving within a spatial region over which a wireless sensor networ...
Devavrat Shah, Sanjay Shakkottai
VTC
2006
IEEE
166views Communications» more  VTC 2006»
15 years 10 months ago
TA-MAC: Task Aware MAC Protocol for Wireless Sensor Networks
Abstract— In wireless sensor networks (WSNs), reducing energy consumption of resource constrained sensor nodes is one of the most important issues. In this paper, we propose a ta...
Sangheon Pack, Jaeyoung Choi, Taekyoung Kwon, Yang...
COMCOM
2007
149views more  COMCOM 2007»
15 years 4 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao