Sciweavers

128 search results - page 19 / 26
» Path key establishment using multiple secured paths in wirel...
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 3 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
WICON
2010
13 years 6 months ago
TRCCIT: Tunable Reliability with Congestion Control for Information Transport in Wireless Sensor Networks
A core functionality of Wireless Sensor Networks (WSNs) is to transport information from the network to the application/user. The evolvable application reliability requirements and...
Neeraj Suri, Faisal Karim Shaikh, Abdelmajid Kheli...
IJSNET
2006
106views more  IJSNET 2006»
13 years 8 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
PERCOM
2006
ACM
14 years 8 months ago
A Multi-Commodity Flow Approach for Globally Aware Routing in Multi-Hop Wireless Networks
Routing in multi-hop wireless networks is typically greedy, with every connection attempting to establish a path that minimizes its number of hops. However, interference plays a m...
Vinay Kolar, Nael B. Abu-Ghazaleh
SENSYS
2006
ACM
14 years 2 months ago
Scalable data aggregation for dynamic events in sensor networks
Computing and maintaining network structures for efficient data aggregation incurs high overhead for dynamic events where the set of nodes sensing an event changes with time. Mor...
Kai-Wei Fan, Sha Liu, Prasun Sinha