Sciweavers

963 search results - page 62 / 193
» 1-cc computer using UWB-IR for wireless sensor network
Sort
View
SASN
2005
ACM
14 years 1 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
13 years 10 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
WCNC
2010
IEEE
13 years 11 months ago
A Reliable Energy-Efficient 802.15.4-Based MAC Protocol for Wireless Sensor Networks
—The IEEE 802.15.4 standard was developed for the purpose of media access control of low power wireless personal area networks. Wireless sensor network devices have the general c...
Yasser Gadallah, Mariam Jaafari
ICPP
2009
IEEE
14 years 2 months ago
Run to Potential: Sweep Coverage in Wireless Sensor Networks
—Wireless sensor networks have become a promising technology in monitoring physical world. In many applications with wireless sensor networks, it is essential to understand how w...
Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu,...
TRIDENTCOM
2008
IEEE
14 years 2 months ago
Single versus multi-hop wireless reprogramming in sensor networks
— Wireless reprogramming of the sensor network is useful for uploading new code or for changing the functionality of the existing code. In recent years, the research focus has sh...
Rajesh Krishna Panta, Saurabh Bagchi, Issa Khalil,...