Sciweavers

4539 search results - page 76 / 908
» Localization in wireless sensor networks
Sort
View
IFIP
2007
Springer
14 years 1 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
PCI
2009
Springer
14 years 8 days ago
Query Sensitive Storage for Wireless Sensor Networks
—Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS),...
Alexis Papadimitriou, Dimitrios Katsaros, Yannis M...
JSAC
2006
127views more  JSAC 2006»
13 years 7 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
GLOBECOM
2008
IEEE
14 years 2 months ago
Robustness Analysis of Source Localization Using Gaussianity Measure
Nowadays, the source localization has been widely applied for wireless sensor networks. The Gaussian mixture model has been adopted for maximum-likelihood (ML) source localization ...
Kun Yan, Hsiao-Chun Wu, S. S. Iyengar
INFOCOM
2010
IEEE
13 years 6 months ago
VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones
—Wireless sensor network (WSN) applications require redundant sensors to guarantee fault tolerance. However, the same degree of redundancy is not necessary for multi-hop communic...
Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu