Sciweavers

2333 search results - page 227 / 467
» Power-aware Node Deployment in Wireless Sensor Networks
Sort
View
ICDCS
2008
IEEE
15 years 11 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
WSNA
2003
ACM
15 years 10 months ago
Analysis on the redundancy of wireless sensor networks
Wireless sensor networks consist of a large number of tiny sensors that have only limited energy supply. One of the major challenges in constructing such networks is to maintain l...
Yong Gao, Kui Wu, Fulu Li
SECON
2008
IEEE
15 years 11 months ago
Per User Throughput in Large Wireless Networks
— Previous results show that a node’s throughput scales poorly as the network size increases when every node has traffic. However, in many cases, only a fraction of nodes in l...
Dan Xu, Xin Liu
ICC
2008
IEEE
168views Communications» more  ICC 2008»
15 years 11 months ago
Topology Control for Reliable Sensor-to-Sink Data Transport in Sensor Networks
— Wireless Sensor Networks (WSNs) are generally used for harsh environments involving military surveillance, emergency response, and habitat monitoring. Due to severe resource co...
Jiong Wang, Sirisha Medidi
MSN
2007
Springer
187views Sensor Networks» more  MSN 2007»
15 years 10 months ago
Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks
Abstract. Multi-hop wireless networks provide a quick and easy way for networking when we need a temporary network or when cabling is difficult. The 802.11 Medium Access Control (M...
Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda