Sciweavers

2189 search results - page 133 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
141
Voted
ICDCS
2006
IEEE
15 years 10 months ago
Distributed Minimal Time Convergecast Scheduling in Wireless Sensor Networks
— We consider applications of sensor networks wherein data packets generated by every node have to reach the base station. This results in a many-to-one communication paradigm re...
Shashidhar Gandham, Ying Zhang, Qingfeng Huang
JCP
2006
157views more  JCP 2006»
15 years 4 months ago
An Infrastructure for Service Oriented Sensor Networks
Emerging wireless technologies enable ubiquitous access to networked services. Integration of wireless technologies into sensor and actuator nodes provides the means for remote acc...
Åke Östmark, Jens Eliasson, Per Lindgre...
ADHOCNOW
2003
Springer
15 years 9 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
IJNSEC
2006
162views more  IJNSEC 2006»
15 years 4 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald
129
Voted
WS
2005
ACM
15 years 9 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du