Sciweavers

298 search results - page 31 / 60
» A key pre-distribution scheme using deployment knowledge for...
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
CCS
2010
ACM
13 years 8 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
AINA
2009
IEEE
14 years 15 days ago
How Long is the Lifetime of a Wireless Sensor Network?
Wireless sensor networks (WSNs) are known to be highly energy-constrained and each network’s lifetime has a strong dependence on the nodes’ battery capacity. As such, the netw...
Nok Hang Mak, Winston Khoon Guan Seah
SECON
2008
IEEE
14 years 1 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...
COMCOM
2007
156views more  COMCOM 2007»
13 years 7 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis