Sciweavers

83 search results - page 7 / 17
» Malicious node detection in wireless sensor networks using w...
Sort
View
JPDC
2007
112views more  JPDC 2007»
13 years 7 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
SIGCOMM
2006
ACM
14 years 1 months ago
Interference-aware fair rate control in wireless sensor networks
In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dyna...
Sumit Rangwala, Ramakrishna Gummadi, Ramesh Govind...
GLOBECOM
2007
IEEE
14 years 2 months ago
Position Estimation Error in Edge Detection for Wireless Sensor Networks using Local Convex View
Abstract—Intuitively, identification of nodes close to the network edge is key to the successful setup, and continued operation, of many sensor network protocols and application...
Marwan Fayed, Hussein T. Mouftah
TWC
2008
156views more  TWC 2008»
13 years 7 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
MOBISYS
2007
ACM
14 years 7 months ago
Radio interferometric tracking of mobile wireless nodes
Location-awareness is an important requirement for many mobile wireless applications today. When GPS is not applicable because of the required precision and/or the resource constr...
Branislav Kusy, János Sallai, György B...