Sciweavers

914 search results - page 46 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
WONS
2005
IEEE
14 years 1 months ago
Dynamic Power Management in Wireless Sensor Networks: An Application-Driven Approach
Energy is a limited resource in wireless sensor networks. In fact, the reduction of power consumption is crucial to increase the lifetime of low power sensor networks. Several app...
Rodrigo M. Passos, Claudionor José Nunes Co...
WIMOB
2008
IEEE
14 years 2 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
IJACTAICIT
2010
135views more  IJACTAICIT 2010»
13 years 2 months ago
New Clustering Protocol to Decrease Probability Failure Nodes and Increasing the Lifetime in WSNs
Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. There are many algorithms in for clustering. LEACH algorithm is one of the...
Davood KeyKhosravi, Ali Ghaffari, Ali Hosseinalipo...
INFOCOM
2008
IEEE
14 years 2 months ago
Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event Detection
—It has been of significant importance to provision network-wide guaranteed QoS for a wide range of event detection applications in wireless sensor networks (WSNs). This paper in...
Yanmin Zhu, Lionel M. Ni