Sciweavers

1150 search results - page 3 / 230
» Beacon Based Authentication
Sort
View
TPDS
2008
157views more  TPDS 2008»
13 years 7 months ago
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks
The localization of sensor nodes is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can acquire...
Bin Xiao, Hekang Chen, Shuigeng Zhou
IPSN
2005
Springer
14 years 29 days ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
INFOCOM
2008
IEEE
14 years 1 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
WICON
2008
13 years 8 months ago
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks
In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet delivery laten...
Li-Hsing Yen, Yee Wei Law, Marimuthu Palaniswami
JNW
2007
89views more  JNW 2007»
13 years 7 months ago
Traffic Aware Power Saving Protocol in Multi-hop Mobile Ad-Hoc Networks
— This paper presents an optimization of PSM to improve its energy conservation. According to PSM, time is divided into beacon intervals. At the beginning of each beacon interval...
Abdelfattah Belghith, Wafa Akkari, Jean-Marie Bonn...