Sciweavers

1116 search results - page 46 / 224
» Packet combining in sensor networks
Sort
View
RTSS
2007
IEEE
14 years 5 months ago
Distributed Minimal Time Convergecast Scheduling for Small or Sparse Data Sources
— Many applications of sensor networks require the base station to collect all the data generated by sensor nodes. As a consequence many-to-one communication pattern, referred to...
Ying Zhang, Shashidhar Gandham, Qingfeng Huang
SSS
2009
Springer
209views Control Systems» more  SSS 2009»
14 years 5 months ago
CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks
Real-time performance is critical for many time-sensitive applications of wireless sensor networks. We present a constrained flooding protocol, called CFlood that enhances the dea...
Bo Jiang, Binoy Ravindran, Hyeonjoong Cho
CCS
2006
ACM
14 years 2 months ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...
ICC
2007
IEEE
166views Communications» more  ICC 2007»
14 years 5 months ago
Dynamic Optimization of Secure Mobile Sensor Networks: A Genetic Algorithm
— We propose a reduced-complexity genetic algorithm for secure and dynamic deployment of resource constrained multi-hop mobile sensor networks. Mobility and security are relative...
Rahul Khanna, Huaping Liu, Hsiao-Hwa Chen
INFOCOM
2011
IEEE
13 years 2 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao