Sciweavers

1096 search results - page 59 / 220
» Gathering-Load-Balanced Tree Protocol for Wireless Sensor Ne...
Sort
View
DCOSS
2006
Springer
14 years 1 months ago
Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks
When communication in sensor networks occurs over wireless links, confidential information about the communication patterns between sensor nodes could be leaked even when encryptio...
William Conner, Tarek F. Abdelzaher, Klara Nahrste...
SECON
2008
IEEE
14 years 4 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...
MOBIHOC
2005
ACM
14 years 9 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
WIOPT
2010
IEEE
13 years 8 months ago
Lifetime optimization for wireless sensor networks with correlated data gathering
—The nodes in wireless sensor networks often collect correlated measurements. Not taking into account this information redundancy is detrimental to the network lifetime, since co...
Nashat Abughalieh, Yann-Aël Le Borgne, Kris S...
CNSR
2007
IEEE
158views Communications» more  CNSR 2007»
13 years 12 months ago
Bounding the Information Collection Performance of Wireless Sensor Network Routing
Wireless sensor networks have mainly been designed for information-collecting purposes, such as habitat monitoring, product process tracing, battlefield surveillance, etc. In orde...
Qinghua Wang, Tingting Zhang, Stefan Pettersson