Sciweavers

2189 search results - page 197 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
144
Voted
JDCTA
2010
111views more  JDCTA 2010»
14 years 11 months ago
Experimental Study on Connectivity for Wireless Sensor Networks
Many works have been devoted to connectivity of wireless sensor networks. This is an important feature for wireless sensor networks (WSNs) to provide the nodes with the capability...
Xiao-gang Qi, Li-fang Liu, San-yang Liu
IJSN
2006
140views more  IJSN 2006»
15 years 4 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
158
Voted
PERCOM
2011
ACM
14 years 8 months ago
Market mechanisms for Value of Information driven resource allocation in Sensor Networks
—This paper examines the possible uses of different market mechanisms for resource allocation at different levels of Wireless Sensor Network (WSN) architecture. The goal is to ma...
Boleslaw K. Szymanski, S. Yousaf Shah, Sahin Cem G...
155
Voted
EWSN
2010
Springer
15 years 11 months ago
Energy-Aware Sparse Approximation Technique (EAST) for Rechargeable Wireless Sensor Networks
Due to non-homogeneous spread of sunlight, sensing nodes typically have non-uniform energy profiles in rechargeable Wireless Sensor Networks (WSNs). An energy-aware work load dist...
Rajib Kumar Rana, Wen Hu, Chun Tung Chou
JSAC
2010
86views more  JSAC 2010»
15 years 3 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...