Sciweavers

376 search results - page 24 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
MDM
2009
Springer
125views Communications» more  MDM 2009»
14 years 3 months ago
Data Gathering by Mobile Mules in a Spatially Separated Wireless Sensor Network
While wireless sensor networks (WSNs) are typically targeted at large-scale deployment, due to many practical or inevitable reasons, a WSN may not always remain connected. In this...
Fang-Jing Wu, Chi-Fu Huang, Yu-Chee Tseng
WCNC
2008
IEEE
14 years 2 months ago
Testbed Implementation of a Secure Flooding Time Synchronization Protocol
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shan...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
14 years 2 months ago
Protection and Restoration from Link Failures in DWDM Networks: A Cross-Layer Study
— Protection against failure in high bandwidth optical networks can prevent significant potential losses of data but at the same time it requires a considerable fraction of the ...
Amir Askarian, Yuxiang Zhai, Suresh Subramaniam, Y...
NSDI
2007
13 years 10 months ago
S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks
Routing protocols for wireless sensor networks must address the challenges of reliable packet delivery at increasingly large scale and highly constrained node resources. Attempts ...
Yun Mao, Feng Wang, Lili Qiu, Simon S. Lam, Jonath...
SENSYS
2004
ACM
14 years 1 months ago
TinySec: a link layer security architecture for wireless sensor networks
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vul...
Chris Karlof, Naveen Sastry, David Wagner