Sciweavers

914 search results - page 133 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 7 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ITCC
2005
IEEE
14 years 1 months ago
Frequency Hopping Pattern Detection in Wireless Ad Hoc Networks
Frequency hopping is a technique that wireless devices communicate in a way that the transmission frequencies are alternated in a pre-determined ordered hopping pattern known only...
Min Song, Scott Wigginton
GLOBECOM
2008
IEEE
14 years 2 months ago
Robust Distributed Sensor Network Localization Based on Analysis of Flip Ambiguities
Abstract— A major problem in wireless sensor network localization is erroneous local geometric realizations in some parts of the network due to the sensitivity to certain distanc...
Anushiya A. Kannan, Baris Fidan, Guoqiang Mao
CEC
2010
IEEE
13 years 8 months ago
Multi-objective mobile agent-based Sensor Network Routing using MOEA/D
Abstract— Mobile agents are often used in wireless sensor networks for distributed target detection with the goal of minimizing the transmission of non-critical data that negativ...
Andreas Konstantinidis 0002, Christoforos Charalam...