Sciweavers

5813 search results - page 307 / 1163
» Sensor Networks
Sort
View
APNOMS
2009
Springer
15 years 11 months ago
Attack Model and Detection Scheme for Botnet on 6LoWPAN
Recently, Botnet has been used to launch spam-mail, key-logging, and DDoS attacks. Botnet is a network of bots which are controlled by attacker. A lot of detection mechanisms have ...
Eung Jun Cho, Jin Ho Kim, Choong Seon Hong
SENSYS
2004
ACM
15 years 10 months ago
Mitigating congestion in wireless sensor networks
Network congestion occurs when offered traffic load exceeds available capacity at any point in a network. In wireless sensor networks, congestion causes overall channel quality t...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
JUCS
2010
217views more  JUCS 2010»
14 years 11 months ago
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
: The use of multimedia sensor nodes can significantly enhance the capability of wireless sensor networks (WSNs) for event description. In a number of scenarios, e.g., an erupting ...
Lei Shu, Manfred Hauswirth, Yan Zhang, Jianhua Ma,...
SENSYS
2006
ACM
15 years 10 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...
INFOCOM
2008
IEEE
15 years 11 months ago
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
—Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper pro...
Xin Hu, Taejoon Park, Kang G. Shin