Sciweavers

650 search results - page 52 / 130
» Localization of Wireless Sensor Nodes Using Proximity Inform...
Sort
View
IJSNET
2007
91views more  IJSNET 2007»
15 years 2 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
ITCC
2005
IEEE
15 years 8 months ago
Zonal Rumor Routing for Wireless Sensor Networks
has to be relayed to nodes interested in those events. Moreover, nodes may also generate queries to find events they are interested in. Thus there is a need to route the informatio...
Tarun Banka, Gagan Tandon, Anura P. Jayasumana
COMSWARE
2007
IEEE
15 years 8 months ago
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks
—Clustering techniques create hierarchal network structures, called clusters, on an otherwise flat network. Neighboring devices elect one appropriate device as clusterhead. Due t...
Matthias R. Brust, Adrian Andronache, Steffen Roth...
143
Voted
DCOSS
2006
Springer
15 years 6 months ago
Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks
When communication in sensor networks occurs over wireless links, confidential information about the communication patterns between sensor nodes could be leaked even when encryptio...
William Conner, Tarek F. Abdelzaher, Klara Nahrste...
117
Voted
NSDI
2007
15 years 4 months ago
S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks
Routing protocols for wireless sensor networks must address the challenges of reliable packet delivery at increasingly large scale and highly constrained node resources. Attempts ...
Yun Mao, Feng Wang, Lili Qiu, Simon S. Lam, Jonath...