Sciweavers

914 search results - page 74 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
WCNC
2008
IEEE
14 years 2 months ago
Arbutus: Network-Layer Load Balancing for Wireless Sensor Networks
—The hot spot problem is a typical byproduct of the many-to-one traffic pattern that characterizes most wireless sensor networks: the nodes with the best channel to the sink are ...
Daniele Puccinelli, Martin Haenggi
CN
2006
117views more  CN 2006»
13 years 8 months ago
Error resilient image transport in wireless sensor networks
In this paper, we propose an "in-network" diversity combining scheme for image transport over wireless sensor networks. We consider a wireless sensor network with both w...
Huaming Wu, Alhussein A. Abouzeid
JSAC
2010
86views more  JSAC 2010»
13 years 6 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...
MOBICOM
2005
ACM
14 years 1 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
EWSN
2004
Springer
14 years 7 months ago
Context-Aware Sensors
Wireless sensor networks typically consist of a large number of sensor nodes embedded in a physical space. Such sensors are low-power devices that are primarily used for monitoring...
Eiman Elnahrawy, Badri Nath