Sciweavers

914 search results - page 83 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
14 years 15 days ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...
INFOCOM
2009
IEEE
14 years 2 months ago
Passive Loss Inference in Wireless Sensor Networks Based on Network Coding
Abstract—The highly stochastic nature of wireless environments makes it desirable to monitor link loss rates in wireless sensor networks. In this paper, we study the loss inferen...
Yunfeng Lin, Ben Liang, Baochun Li
PERCOM
2010
ACM
13 years 6 months ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang
BROADNETS
2006
IEEE
14 years 1 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...
ADHOCNETS
2010
Springer
13 years 5 months ago
Sensorium - An Active Monitoring System for Neighborhood Relations in Wireless Sensor Networks
Communication neighborhood in wireless sensor networks changes often as links break or appear. Therefore, monitoring link quality and (logical) network topology is necessary. As no...
Stefan Nürnberger, Reinhardt Karnapke, Jö...