Sciweavers

4189 search results - page 88 / 838
» On the Security of Wireless Sensor Networks
Sort
View
IPSN
2009
Springer
14 years 2 months ago
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
Leonardo B. Oliveira, Aman Kansal, Bodhi Priyantha...
CCR
2010
203views more  CCR 2010»
13 years 8 months ago
Minimizing energy consumptions in wireless sensor networks via two-modal transmission
We present a sophisticated framework to systematically explore the temporal correlation in environmental monitoring wireless sensor networks. The presented framework optimizes los...
Yao Liang, Wei Peng
CATA
2003
13 years 9 months ago
Efficient Even Distribution of Power Consumption in Wireless Sensor Networks
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the e...
Ioan Raicu
DCOSS
2010
Springer
13 years 11 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
SECON
2007
IEEE
14 years 2 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao