Sciweavers

25316 search results - page 108 / 5064
» Computational sensor networks
Sort
View
APNOMS
2009
Springer
14 years 4 months ago
Attack Model and Detection Scheme for Botnet on 6LoWPAN
Recently, Botnet has been used to launch spam-mail, key-logging, and DDoS attacks. Botnet is a network of bots which are controlled by attacker. A lot of detection mechanisms have ...
Eung Jun Cho, Jin Ho Kim, Choong Seon Hong
CIS
2007
Springer
14 years 4 months ago
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks
ct This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant ...
Shih-I Huang, Shiuhpyng Shieh
CSE
2009
IEEE
14 years 2 months ago
A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor Networks
— this paper proposes a distributed routing protocol for ad hoc sensor networks which uses Fuzzy Logic. Each sensor uses a Fuzzy decision making process to find the best Cluster ...
Shahram Nourizadeh, Yeqiong Song, Jean-Pierre Thom...
MUE
2007
IEEE
71views Multimedia» more  MUE 2007»
14 years 4 months ago
Query Predicate Preprocessing in Wireless Sensor Networks
With the developments of related techniques in telecommunication and computer sciences, wireless sensor networks have been used more and more widely. While sensor nodes in wireles...
Min Meng, Hui Xu, Byeong-Soo Jeong, Sungyoung Lee,...
DCOSS
2011
Springer
12 years 10 months ago
A local average consensus algorithm for wireless sensor networks
—In many application scenarios sensors need to calculate the average of some local values, e.g. of local measurements. A possible solution is to rely on consensus algorithms. In ...
Konstantin Avrachenkov, Mahmoud El Chamie, Giovann...