Sciweavers

332 search results - page 22 / 67
» Identity Aware Sensor Networks
Sort
View
IEEEIAS
2008
IEEE
14 years 2 months ago
Network Level Privacy for Wireless Sensor Networks
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network leve...
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Aurio...
ADHOC
2007
67views more  ADHOC 2007»
13 years 8 months ago
Threshold-related throughput - A new criterion for evaluation of sensor network performance
Energy efficient and power aware protocols are of utmost importance in Sensor Networks. The most popular criteria, so far, for evaluating performance of energy-aware protocols are...
Ilya Ledvich, Adrian Segall
ALGOSENSORS
2006
Springer
14 years 6 days ago
Self-deployment Algorithms for Mobile Sensors on a Ring
Abstract. We consider the self-deployment problem in a ring for a network of identical sensors: starting from some initial random placement in the ring, the sensors in the network ...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro
ICDCSW
2005
IEEE
14 years 2 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
VLSID
2001
IEEE
179views VLSI» more  VLSID 2001»
14 years 8 months ago
Low-Power Wireless Sensor Networks
- Wireless distributed microsensor systems will enable fault tolerant monitoring and control of a variety of applications. Due to the large number of microsensor nodes that may be ...
Rex Min, Manish Bhardwaj, Seong-Hwan Cho, Eugene S...