Sciweavers

4189 search results - page 202 / 838
» On the Security of Wireless Sensor Networks
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
TWC
2011
417views more  TWC 2011»
13 years 2 months ago
A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
Abstract—We target a two-tier sensor network with resourcerich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sen...
Jing Shi, Rui Zhang, Yanchao Zhang
MUE
2008
IEEE
120views Multimedia» more  MUE 2008»
14 years 2 months ago
Investigating Wireless Sensor Network Lifetime Using a Realistic Radio Communication Model
Investigating realistic simulations in wireless sensor networks has been an area which has drawn a lot of research interest. These simulations are used to predict the lifetime of ...
Michael Mallinson, Sajid Hussain, Jong Hyuk Park
IDEAS
2006
IEEE
180views Database» more  IDEAS 2006»
14 years 2 months ago
SURCH: Distributed Aggregation over Wireless Sensor Networks
In this paper, we present SURCH, a novel decentralized algorithm for efficient processing of queries generated in sensor networks. Unlike existing techniques, SURCH is fully dist...
Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubraman...
MOBIDE
2010
ACM
13 years 8 months ago
Using data mining to handle missing data in multi-hop sensor network applications
A sensor's data loss or corruption, aka sensor data missing, is a common phenomenon in modern wireless sensor networks. It is more severe for multi-hop sensor network (MSN) a...
Le Gruenwald, Hanqing Yang, Md. Shiblee Sadik, Rah...