Sciweavers

2189 search results - page 169 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
APCHI
2008
IEEE
15 years 11 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo
ETFA
2008
IEEE
15 years 6 months ago
Is CSMA/CA really efficient against interference in a wireless control system? An experimental answer
The deployment of a wireless control system must cope with a number of effects usually negligible in a wired scenario. To this aim, an experimental analysis on suitable prototypes...
Matteo Bertocco, Giovanni Gamba, Alessandro Sona
WISEC
2009
ACM
15 years 11 months ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt
ICWN
2008
15 years 5 months ago
Coverage Efficient Clustering Method Based on Time Delay for Wireless Sensor Networks
Energy efficient operations are essential to increase the lifetime of wireless sensor network. A clustering-based protocol is one approach that reduces energy by a data aggregation...
Ji Gong, Hyuntae Kim, Gihwan Cho
IPPS
2008
IEEE
15 years 11 months ago
Mobility control schemes with quick convergence in wireless sensor networks
In the near future, wireless sensor networks (WSN) performing sensing and communication tasks will be widely deployed as technology rapidly advances. Communication is one of the e...
Xiao Chen, Zhen Jiang, Jie Wu