Sciweavers

298 search results - page 24 / 60
» A key pre-distribution scheme using deployment knowledge for...
Sort
View
WS
2004
ACM
14 years 24 days ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
VTC
2010
IEEE
195views Communications» more  VTC 2010»
13 years 5 months ago
Efficiency of Distributed Compression and Its Dependence on Sensor Node Deployments
Abstract--In this paper we analyze the energy-efficiency of distributed compression and its dependence on the node deployment strategies for Wireless Sensor Networks (WSNs). Reduce...
Frank Oldewurtel, Janne Riihijärvi, Petri M&a...
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 1 months ago
Providing Transparent Security Services to Sensor Networks
— In this paper we introduce a link layer security platform for wireless sensor networks. At the heart of this platform, lies our key management module facilitating an efficient...
Hamed Soroush, Mastooreh Salajegheh, Tassos Dimitr...
DCOSS
2007
Springer
14 years 1 months ago
Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networ
Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor netw...
Luís M. A. Bettencourt, Aric A. Hagberg, Le...
ALGOSENSORS
2007
Springer
13 years 9 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...