Sciweavers

658 search results - page 71 / 132
» On the Connectivity of Key-Distribution Strategies in Wirele...
Sort
View
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
GLOBECOM
2007
IEEE
14 years 2 months ago
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
— In Wireless Sensor Networks (WSNs), symmetric key schemes may be used to provide security. Recently, a class of random key pre-distribution techniques have been proposed and in...
Jing Deng, Yunghsiang S. Han
VTC
2006
IEEE
153views Communications» more  VTC 2006»
14 years 1 months ago
Ordinal MDS-Based Localization for Wireless Sensor Networks
— There are various applications in wireless sensor networks which require knowing the relative or actual position of the sensor nodes. Recently, there have been different locali...
Vijayanth Vivekanandan, Vincent W. S. Wong
IJSNET
2006
170views more  IJSNET 2006»
13 years 7 months ago
Ordinal MDS-based localisation for wireless sensor networks
: There are various applications in wireless sensor networks which require knowing the relative or actual position of the sensor nodes. Over the past few years, there have been dif...
Vijayanth Vivekanandan, Vincent W. S. Wong
COMSWARE
2007
IEEE
14 years 2 months ago
Distributed Fault-Tolerant Topology Control in Static and Mobile Wireless Sensor Networks
— In wireless sensor networks, minimizing power consumption and at the same time maintaining desired properties in the network topology is of prime importance. In this work, we p...
Indranil Saha, Lokesh Kumar Sambasivan, Ranjeet Ku...