Sciweavers

523 search results - page 73 / 105
» Nodes Localization through Data Fusion in Sensor Network
Sort
View
CONEXT
2007
ACM
13 years 12 months ago
Towards a clustering based data diffusion protocol in delay tolerant networks
In Delay Tolerant Networks (DTN), diffusion protocols can benefit from the users’ mobility in order to reach some distant nodes. However, existing protocols like flooding pres...
Sana Tmar, Eric Fleury
IFIP
2007
Springer
14 years 4 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
WICON
2008
13 years 11 months ago
SAMPL: a simple aggregation and message passing layer for sensor networks
In recent years, wireless sensor networking has shown great promise in applications ranging from industrial control, environmental monitoring and inventory tracking. Given the res...
Anthony Rowe, Karthik Lakshmanan, Ragunathan Rajku...
INFOCOM
2010
IEEE
13 years 8 months ago
Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization
—Knowing accurate positions of nodes in wireless ad-hoc and sensor networks is essential for a wide range of pervasive and mobile applications. However, errors are inevitable in ...
Lirong Jian, Zheng Yang, Yunhao Liu
JCP
2006
100views more  JCP 2006»
13 years 10 months ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah