Sciweavers

376 search results - page 26 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor Networks
Abstract—Many sensor network applications are tightly coupled with the geometric environment where the sensor nodes are deployed. The topological skeleton extraction has shown gr...
Hongbo Jiang, Wenping Liu, Dan Wang, Chen Tian, Xi...
TC
2008
13 years 8 months ago
A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking
As one of the fundamental issues in wireless sensor networks (WSNs), the sensor localization problem has recently received extensive attention. In this work, we investigate this pr...
Liqiang Zhang, Qiang Cheng, Yingge Wang, Sherali Z...
SENSYS
2009
ACM
14 years 3 months ago
Experiences with a high-fidelity wireless building energy auditing network
We describe the design, deployment, and experience with a wireless sensor network for high-fidelity monitoring of electrical usage in buildings. A network of 38 mote-class AC met...
Xiaofan Jiang, Minh Van Ly, Jay Taneja, Prabal Dut...
MOBIHOC
2005
ACM
14 years 8 months ago
Reliable bursty convergecast in wireless sensor networks
We address the challenges of bursty convergecast in multi-hop wireless sensor networks, where a large burst of packets from different locations needs to be transported reliably an...
Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed...
SASN
2006
ACM
14 years 2 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li