Sciweavers

1744 search results - page 204 / 349
» On composability of localization protocols for wireless sens...
Sort
View
SECON
2007
IEEE
14 years 2 months ago
Query privacy in wireless sensor networks
— Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions but ...
Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pea...
MSN
2007
Springer
151views Sensor Networks» more  MSN 2007»
14 years 2 months ago
A Low Latency MAC Scheme for Event-Driven Wireless Sensor Networks
In this paper, we present a low latency media access control scheme which we call LLMAC (Low Latency MAC) for event-driven wireless sensor networks (WSN). In this kind of WSN, sens...
Hung-Cuong Le, Hervé Guyennet, Violeta Fele...
HPCC
2009
Springer
14 years 19 days ago
A Compensation-Based Reliable Data Delivery for Instant Wireless Sensor Network
Instant wireless sensor network (IWSN) is a type of WSN deployed for a class of special applications which have the common requirement on instantly responding for collecting and t...
Yi-Ying Zhang, Xi Luo, Laurence Tianruo Yang, Lei ...
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 3 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
IJSN
2006
140views more  IJSN 2006»
13 years 8 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi