Sciweavers

376 search results - page 24 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
142
Voted
MDM
2009
Springer
125views Communications» more  MDM 2009»
15 years 10 months ago
Data Gathering by Mobile Mules in a Spatially Separated Wireless Sensor Network
While wireless sensor networks (WSNs) are typically targeted at large-scale deployment, due to many practical or inevitable reasons, a WSN may not always remain connected. In this...
Fang-Jing Wu, Chi-Fu Huang, Yu-Chee Tseng
131
Voted
WCNC
2008
IEEE
15 years 10 months ago
Testbed Implementation of a Secure Flooding Time Synchronization Protocol
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shan...
116
Voted
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 10 months ago
Protection and Restoration from Link Failures in DWDM Networks: A Cross-Layer Study
— Protection against failure in high bandwidth optical networks can prevent significant potential losses of data but at the same time it requires a considerable fraction of the ...
Amir Askarian, Yuxiang Zhai, Suresh Subramaniam, Y...
125
Voted
NSDI
2007
15 years 6 months ago
S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks
Routing protocols for wireless sensor networks must address the challenges of reliable packet delivery at increasingly large scale and highly constrained node resources. Attempts ...
Yun Mao, Feng Wang, Lili Qiu, Simon S. Lam, Jonath...
133
Voted
SENSYS
2004
ACM
15 years 9 months ago
TinySec: a link layer security architecture for wireless sensor networks
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vul...
Chris Karlof, Naveen Sastry, David Wagner