Sciweavers

602 search results - page 82 / 121
» Decentralized intrusion detection in wireless sensor network...
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
13 years 8 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
ICN
2005
Springer
14 years 1 months ago
Information Fusion for Data Dissemination in Self-Organizing Wireless Sensor Networks
Data dissemination is a fundamental task in wireless sensor networks. Because of the radios range limitation and energy consumption constraints, sensor data is commonly disseminate...
Eduardo Freire Nakamura, Carlos Mauricio S. Figuei...
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
GLOBECOM
2009
IEEE
14 years 2 months ago
MRSD: Multirate-Based Service Differentiation for the IEEE 802.15.4 Wireless Sensor Network
—The IEEE 802.15.4 standard has no provisions for rate sensitive applications because of its ability to operate in pure CSMA/CA or TDMA modes. Some operating scenarios for rate-s...
Chewoo Na, Yaling Yang
CSE
2008
IEEE
14 years 2 months ago
Energy Model for H2S Monitoring Wireless Sensor Network
Abstract— Several applications have been proposed for Wireless sensor networks. These include habitat monitoring, structural health monitoring, pipeline (gas, water, and oil) mon...
Xiaojuan Chao, Waltenegus Dargie, Lin Guan