Sciweavers

2189 search results - page 144 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
INFOCOM
2011
IEEE
14 years 7 months ago
Multiple task scheduling for low-duty-cycled wireless sensor networks
—For energy conservation, a wireless sensor network is usually designed to work in a low-duty-cycle mode, in which a sensor node keeps active for a small percentage of time durin...
Shuguang Xiong, Jianzhong Li, Mo Li, Jiliang Wang,...
INFOCOM
2009
IEEE
15 years 11 months ago
Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor Networks
—We present the Flash flooding protocol for rapid network flooding in wireless sensor networks. Traditional flooding protocols can be very slow because of neighborhood content...
Jiakang Lu, Kamin Whitehouse
INFOCOM
2011
IEEE
14 years 7 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
IPCCC
2005
IEEE
15 years 9 months ago
SECK: survivable and efficient clustered keying for wireless sensor networks
A wireless sensor network (WSN) typically consists of a large number of small sensor nodes and one or more highend control and data aggregation nodes. Sensor nodes have limited co...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
ICWN
2003
15 years 5 months ago
Distributed Energy Aware MAC Layer Protocol for Wireless Sensor Networks
Due to the fact that sensor nodes are untethered and unattended, energy management is a critical issue in communication mechanism of a wireless sensor network. In this paper, we a...
Ramaraju Kalidindi, Rajgopal Kannan, S. Sitharama ...