Sciweavers

914 search results - page 118 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
GLOBECOM
2008
IEEE
14 years 2 months ago
Duty-Cycle Optimization in Unslotted 802.15.4 Wireless Sensor Networks
—We present a novel approach for minimizing the energy consumption of medium access control (MAC) protocols developed for duty-cycled wireless sensor networks (WSN) for the unslo...
Sinem Coleri Ergen, Carlo Fischione, Dimitri Maran...
ICCCN
2007
IEEE
13 years 11 months ago
Localized and Configurable Topology Control in Lossy Wireless Sensor Networks
Wireless sensor networks (WSNs) introduce new challenges to topology control due to the prevalence of lossy links. We propose a new topology control formulation for lossy WSNs that...
Guoliang Xing, Chenyang Lu, Robert Pless
FGCN
2008
IEEE
170views Communications» more  FGCN 2008»
14 years 2 months ago
NetTopo: Beyond Simulator and Visualizer for Wireless Sensor Networks
Simulators are needed for testing algorithms of wireless sensor networks (WSNs) for large scale scenarios. Deploying real WSN testbed provides a more realistic testing environment...
Lei Shu, Chun Wu, Yan Zhang, Jiming Chen, Lei Wang...
CORR
2010
Springer
183views Education» more  CORR 2010»
13 years 7 months ago
On the Energy Efficiency of LT Codes in Proactive Wireless Sensor Networks
This paper presents the first analysis on the energy efficiency of LT codes with Non-Coherent M-ary Frequency Shift Keying (NCMFSK), known as green modulation [1], in a proactive W...
Jamshid Abouei, J. David Brown, Konstantinos N. Pl...
TMC
2010
138views more  TMC 2010»
13 years 6 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu