Sciweavers

1860 search results - page 32 / 372
» J-Sim: A Simulation Environment for Wireless Sensor Networks
Sort
View
TMC
2012
11 years 11 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
COMCOM
2007
95views more  COMCOM 2007»
13 years 8 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
EWSN
2006
Springer
14 years 8 months ago
Sensor Density for Complete Information Coverage in Wireless Sensor Networks
Abstract. Coverage is a very important issue in wireless sensor networks. Current literature defines a point to be covered if it is within the sensing radius of at least one sensor...
Bang Wang, Kee Chaing Chua, Vikram Srinivasan, Wei...
SIGOPSE
2004
ACM
14 years 2 months ago
Generic role assignment for wireless sensor networks
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network appl...
Kay Römer, Christian Frank, Pedro José...
COMSWARE
2006
IEEE
14 years 2 months ago
FACTS - A rule-based middleware architecture for wireless sensor networks
ing a middleware abstraction layer into wireless sensor networks is a widely accepted solution to facilitate application programming and allow network organization. In this paper,...
Kirsten Terfloth, Georg Wittenburg, Jochen H. Schi...