Sciweavers

173 search results - page 26 / 35
» Detecting selective forwarding attacks in wireless sensor ne...
Sort
View
EWSN
2009
Springer
14 years 3 months ago
DHV: A Code Consistency Maintenance Protocol for Multi-hop Wireless Sensor Networks
Ensuring that every sensor node has the same code version is challenging in dynamic, unreliable multi-hop sensor networks. When nodes have different code versions, the network may...
Thanh Dang, Nirupama Bulusu, Wu-chi Feng, Seungweo...
VTC
2008
IEEE
125views Communications» more  VTC 2008»
14 years 2 months ago
A Bio-Inspired Scheduling Scheme for Wireless Sensor Networks
— Sensor networks with a large amount of sensor nodes usually have high redundancy in sensing coverage. The network lifetime can be further extended by proper scheduling and putt...
Chi-Tsun Cheng, Chi Kong Tse, Francis C. M. Lau
ICASSP
2010
IEEE
13 years 8 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
INFOCOM
2011
IEEE
12 years 12 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
WISTP
2007
Springer
14 years 2 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius