Sciweavers

2705 search results - page 408 / 541
» Splitting the sensor node
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
PEWASUN
2005
ACM
15 years 9 months ago
Three-dimensional routing in underwater acoustic sensor networks
Underwater sensor networks will find applications in oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation, and tact...
Dario Pompili, Tommaso Melodia
WOWMOM
2005
ACM
165views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
Recent work on key establishment for sensor networks has shown that it is feasible to employ limited Elliptic Curve Cryptography in sensor networks through hybrid protocols. In th...
Panayiotis Kotzanikolaou, Emmanouil Magkos, Christ...
114
Voted
IPSN
2004
Springer
15 years 9 months ago
An energy-aware data-centric generic utility based approach in wireless sensor networks
Distinct from wireless ad hoc networks, wireless sensor networks are data-centric, application-oriented, collaborative, and energyconstrained in nature. In this paper, formulate t...
Wei-Peng Chen, Lui Sha
ISLPED
2003
ACM
138views Hardware» more  ISLPED 2003»
15 years 9 months ago
An environmental energy harvesting framework for sensor networks
Energy constrained systems such as sensor networks can increase their usable lifetimes by extracting energy from their environment. However, environmental energy will typically no...
Aman Kansal, Mani B. Srivastava