Sciweavers

55 search results - page 6 / 11
» An authentication scheme for locating compromised sensor nod...
Sort
View
JCM
2008
69views more  JCM 2008»
13 years 6 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
SEUS
2007
IEEE
14 years 29 days ago
Energy-Aware Routing for Wireless Sensor Networks by AHP
Abstract. Wireless sensor networks (WSNs) are comprised of energy constrained nodes. This limitation has led to the crucial need for energy-aware protocols to produce an efficient ...
Xiaoling Wu, Jinsung Cho, Brian J. d'Auriol, Sungy...
SASN
2006
ACM
14 years 20 days ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
TON
2010
109views more  TON 2010»
13 years 5 months ago
Rendered path: range-free localization in anisotropic sensor networks with holes
Sensor positioning is a crucial part of many location-dependent applications that utilize wireless sensor networks (WSNs). Current localization approaches can be divided into two ...
Mo Li, Yunhao Liu
ICPPW
2007
IEEE
14 years 28 days ago
Cooperative Localization with Pre-Knowledge Using Bayesian Network for Wireless Sensor Networks
Obtaining location information by localization schemes for sensor nodes makes applications of wireless sensor networks (WSNs) more meaningful. Most of localization schemes only us...
Shih-Hsiang Lo, Chun-Hsien Wu, Yeh-Ching Chung