Sciweavers

861 search results - page 152 / 173
» Detecting cuts in sensor networks
Sort
View
133
Voted
PODC
2005
ACM
15 years 9 months ago
Maximal independent sets in radio networks
We study the distributed complexity of computing a maximal independent set (MIS) in radio networks with completely unknown topology, asynchronous wake-up, and no collision detecti...
Thomas Moscibroda, Roger Wattenhofer
127
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
123
Voted
AINA
2006
IEEE
15 years 7 months ago
Distributed Model-Based Diagnosis using Object-Relational Constraint Databases
This work presents a proposal to diagnose distributed systems utilizing model-based diagnosis using distributed databases. In order to improve aspects as versatility, persistence,...
María Teresa Gómez López, Raf...
184
Voted
EJWCN
2010
237views more  EJWCN 2010»
14 years 10 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
131
Voted
FTDB
2011
98views more  FTDB 2011»
14 years 7 months ago
Secure Distributed Data Aggregation
We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithm...
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn S...