Sciweavers

283 search results - page 20 / 57
» Practical ID-based encryption for wireless sensor network
Sort
View
ADHOCNETS
2009
Springer
14 years 2 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
NETWORK
2006
302views more  NETWORK 2006»
13 years 7 months ago
Node clustering in wireless sensor networks: recent developments and deployment challenges
The large-scale deployment of wireless sensor networks (WSNs) and the need for data aggregation necessitate efficient organization of the network topology for the purpose of balan...
Ossama Younis, Marwan Krunz, Srinivasan Ramasubram...
PPSN
2010
Springer
13 years 6 months ago
Topography-Aware Sensor Deployment Optimization with CMA-ES
Abstract. Wireless Sensor Networks (WSN) have been studied intensively for various applications such as monitoring and surveillance. Sensor deployment is an essential part of WSN, ...
Vahab Akbarzadeh, Albert Hung-Ren Ko, Christian Ga...
INFOCOM
2005
IEEE
14 years 1 months ago
A beacon-less location discovery scheme for wireless sensor networks
— In wireless sensor networks (WSNs), sensor location plays a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of l...
Lei Fang, Wenliang Du, Peng Ning
SENSYS
2004
ACM
14 years 1 months ago
Using hierarchical location names for scalable routing and rendezvous in wireless sensor networks
Until practical ad-hoc localization systems are developed, early deployments of wireless sensor networks will manually configure location information in network nodes in order to...
Fang Bian, Ramesh Govindan, Scott Shenker, Xin Li