Sciweavers

2189 search results - page 211 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 4 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
15 years 11 months ago
Asynchronous distributed optimization with minimal communication
— We consider problems where multiple agents must cooperate to control their individual state so as to optimize a common objective while communicating with each other to exchange...
Minyi Zhong, Christos G. Cassandras
IWANN
2009
Springer
15 years 11 months ago
Introducing a Distributed Architecture for Heterogeneous Wireless Sensor Networks
This paper presents SYLPH, a novel distributed architecture which integrates a service-oriented approach into Wireless Sensor Networks. One of the characteristics of SYLPH is that ...
Dante I. Tapia, Ricardo S. Alonso, Juan Francisco ...
WWIC
2009
Springer
109views Communications» more  WWIC 2009»
15 years 11 months ago
On Prolonging Sensornode Gateway Lifetime by Adapting Its Duty Cycle
In this paper we discuss the lifetime of an battery powered device which acts as a gateway between a wireless sensor network and a standard network. The wireless communication stan...
Marcin Brzozowski, Peter Langendoerfer
CN
2004
146views more  CN 2004»
15 years 4 months ago
Spatio-temporal correlation: theory and applications for wireless sensor networks
Wireless Sensor Networks (WSN) are characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. Due to high density in the network topology...
Mehmet C. Vuran, Özgür B. Akan, Ian F. A...