Sciweavers

452 search results - page 22 / 91
» Energy Maps for Large-scale, Mobile Wireless Networks
Sort
View
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 7 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
WICON
2010
13 years 5 months ago
TRCCIT: Tunable Reliability with Congestion Control for Information Transport in Wireless Sensor Networks
A core functionality of Wireless Sensor Networks (WSNs) is to transport information from the network to the application/user. The evolvable application reliability requirements and...
Neeraj Suri, Faisal Karim Shaikh, Abdelmajid Kheli...
JSAC
2010
86views more  JSAC 2010»
13 years 6 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...
WCE
2007
13 years 8 months ago
Modified Energy Efficient Cache Invalidation Algorithm in Mobile Environment
– Maintenance of the cache consistency is a complicated issue in the wireless mobile environment. Caching of frequently accessed data items on the node can reduce the bandwidth r...
S. Sankara Gomathi, S. Krishnamurthi
JNW
2008
116views more  JNW 2008»
13 years 7 months ago
The Tiny Agent - Wireless Sensor Networks Controlling Energy Resources
CSIRO is using wireless sensor network technology to deploy "tiny agents", working as autonomous controllers for individual pieces of electrical load/generation equipment...
Glenn Platt, Joshua Wall, Philip Valencia, John K....