Sciweavers

2189 search results - page 180 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
ESAS
2005
Springer
15 years 10 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...
GLOBECOM
2006
IEEE
15 years 10 months ago
A Novel Systematic Resource Transfer Method for Wireless Sensor Networks
— The use of wireless sensor networks for gathering environmental and safety-critical data in real time is increasing at a rapid rate. Some of the main criteria in designing sens...
Winnie Louis Lee, Amitava Datta, Rachel Cardell-Ol...
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 10 months ago
Finite Queuing Model Analysis for Energy and QoS Tradeoff in Contention-Based Wireless Sensor Networks
In contention-based sensor networks, nodes compete to access a shared channel for data transmission and collision is a common challenge. For power conservation, periodical active/s...
Jun Luo, Ling-ge Jiang, Chen He
TWC
2010
14 years 11 months ago
Lifetime-resource tradeoff for multicast traffic in wireless sensor networks
In this paper, we study the problem of supporting multicast traffic in wireless sensor networks with network coding. On one hand, coding operations can reduce power consumption and...
Vahid Shah-Mansouri, Vincent W. S. Wong
EWSN
2006
Springer
16 years 4 months ago
Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks
Nodes in sensor networks often encounter spatially-correlated contention, where multiple nodes in the same neighborhood all sense an event they need to transmit information about....
Kyle Jamieson, Hari Balakrishnan, Y. C. Tay