Sciweavers

1067 search results - page 110 / 214
» Efficient point coverage in wireless sensor networks
Sort
View
IFIP
2007
Springer
14 years 2 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
IJDSN
2010
147views more  IJDSN 2010»
13 years 2 months ago
Position-Based Aggregator Node Election in Wireless Sensor Networks
In this paper, we introduce PANEL, a position-based aggregator node election protocol for wireless sensor networks. The novelty of PANEL with respect to other aggregator node elec...
Levente Buttyán, Péter Schaffer
COMSWARE
2007
IEEE
13 years 12 months ago
Robust and Efficient Software Management in Sensor Networks
Software deployment and updating of deployed code is a critical topic in the area of wireless sensor networks (WSN). Reasons are unreliable network connectivity, resource limitatio...
Wolfgang Schröder-Preikschat, Rüdiger Ka...
MOBIQUITOUS
2008
IEEE
14 years 2 months ago
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic
Heterogeneous applications could be assimilated within the same wireless sensor network with the aid of modern motes that have multiple sensor boards on a single radio board. Diff...
Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-S...
SASN
2006
ACM
14 years 2 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...