Sciweavers

1457 search results - page 22 / 292
» A survey on clustering algorithms for wireless sensor networ...
Sort
View
ICCSA
2005
Springer
14 years 1 months ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez
EUC
2005
Springer
14 years 1 months ago
HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks
Wireless sensor networks comprise of small nodes with sensing, computation and wireless communication capabilities. The energy efficiency is a substantial key design issues in suc...
Ying-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Chi...
SIGMOD
2008
ACM
245views Database» more  SIGMOD 2008»
14 years 7 months ago
Information fusion in wireless sensor networks
In wireless sensor networks (WSNs), energy consumption and data quality are two important issues due to limited energy resources and the need for accurate data. In this scenario, i...
Eduardo Freire Nakamura, Antonio Alfredo Ferreira ...
NETWORK
2007
234views more  NETWORK 2007»
13 years 7 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
ESAS
2007
Springer
14 years 1 months ago
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
Christoph Krauß, Frederic Stumpf, Claudia M....