Sciweavers

1662 search results - page 94 / 333
» Soft Computing in Wireless Sensors Networks
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 7 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
SUTC
2006
IEEE
15 years 7 months ago
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have ...
Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, ...
IEEECSA
2009
14 years 11 months ago
A Fine-Grained Localization Scheme Using a Mobile Beacon Node for Wireless Sensor Networks
In this paper, we present a fine-grained localization algorithm for wireless sensor networks using a mobile beacon node. The algorithm is based on distance measurement using RSSI. ...
Kezhong Liu, Ji Xiong, Yongqiang Cui, Dong Han
BIOWIRE
2007
Springer
15 years 7 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
SRDS
2008
IEEE
15 years 8 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...