Sciweavers

2360 search results - page 257 / 472
» Performance Evaluation of DTSN in Wireless Sensor Networks
Sort
View
JNCA
2011
137views more  JNCA 2011»
13 years 3 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
ICDE
2006
IEEE
163views Database» more  ICDE 2006»
14 years 9 months ago
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks
Wireless sensor networks generate a vast amount of data. This data, however, must be sparingly extracted to conserve energy, usually the most precious resource in battery-powered ...
Adam Silberstein, Carla Schlatter Ellis, Jun Yang ...
CONEXT
2006
ACM
14 years 2 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
BSN
2009
IEEE
211views Sensor Networks» more  BSN 2009»
14 years 28 days ago
TEMPO 3.1: A Body Area Sensor Network Platform for Continuous Movement Assessment
— This work presents TEMPO (Technology-Enabled Medical Precision Observation) 3.1, a third generation body area sensor platform that accurately and precisely captures, processes,...
Adam T. Barth, Mark A. Hanson, Harry C. Powell Jr....
WIMOB
2008
IEEE
14 years 2 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...