Sciweavers

2189 search results - page 126 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
149
Voted
ITIIS
2010
140views more  ITIIS 2010»
14 years 11 months ago
RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
In Hur, Moonseong Kim, Jaewan Seo, Hyunseung Choo
INFOCOM
2008
IEEE
15 years 10 months ago
On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast
—Sleep-wake scheduling is an effective mechanism to prolong the lifetime of energy-constrained wireless sensor networks. However, it incurs an additional delay for packet deliver...
Joohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun S...
IJDSN
2006
136views more  IJDSN 2006»
15 years 4 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
NANONET
2009
Springer
233views Chemistry» more  NANONET 2009»
15 years 10 months ago
RF Control of Biological Systems: Applications to Wireless Sensor Networks
We present a vision and preliminary results for a combined RF-Biological Systems where the Electro-Magnetic energy of RF signals is transduced into control-signals for biological s...
Hooman Javaheri, Guevara Noubir, Sanaa Noubir
INFOCOM
2005
IEEE
15 years 9 months ago
A beacon-less location discovery scheme for wireless sensor networks
— In wireless sensor networks (WSNs), sensor location plays a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of l...
Lei Fang, Wenliang Du, Peng Ning