Sciweavers

703 search results - page 63 / 141
» Coverage Analysis for Wireless Sensor Networks
Sort
View
ICDCS
2008
IEEE
14 years 3 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ICC
2007
IEEE
153views Communications» more  ICC 2007»
14 years 3 months ago
A Walking Beacon-Assisted Localization in Wireless Sensor Networks
—The localization of the sensor node is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can a...
Bin Xiao, Hekang Chen, Shuigeng Zhou
VLSISP
2008
95views more  VLSISP 2008»
13 years 8 months ago
A New Routing Metric for Satisfying Both Energy and Delay Constraints in Wireless Sensor Networks
Besides energy constraint, wireless sensor networks should also be able to provide bounded communication delay when they are used to support real-time applications. In this paper,...
Najet Boughanmi, Yeqiong Song
SUTC
2008
IEEE
14 years 3 months ago
Training Data Compression Algorithms and Reliability in Large Wireless Sensor Networks
With the availability of low-cost sensor nodes there have been many standards developed to integrate and network these nodes to form a reliable network allowing many different typ...
Vasanth Iyer, Rammurthy Garimella, M. B. Srinivas
SENSYS
2006
ACM
14 years 2 months ago
RBP: robust broadcast propagation in wireless networks
Varying interference levels make broadcasting an unreliable operation in low-power wireless networks. Many routing and resource discovery protocols depend on flooding (repeated pe...
Fred Stann, John S. Heidemann, Rajesh Shroff, Muha...