Sciweavers

1860 search results - page 144 / 372
» J-Sim: A Simulation Environment for Wireless Sensor Networks
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 4 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
PIMRC
2008
IEEE
14 years 3 months ago
Dynamic data aggregation and transport in wireless sensor networks
—In wireless sensor networks, in-network aggregation is the process of compressing locally the data gathered by the sensor nodes, so that only the compressed data travel across s...
Mario O. Diaz, Kin K. Leung
MDM
2010
Springer
250views Communications» more  MDM 2010»
13 years 11 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...
EWSN
2010
Springer
14 years 6 months ago
TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks
Multi-hop routing in wireless sensor networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an a...
Guoxing Zhan, Weisong Shi, Julia Deng
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 3 months ago
Robust Localization in Wireless Sensor Networks through the Revocation of Malicious Anchors
— In a wireless sensor network (WSN), the sensor nodes (SNs) generally localize themselves with the help of anchors that are pre-deployed in the network. Time of Arrival (ToA) is...
Satyajayant Misra, Guoliang Xue, Aviral Shrivastav...