Sciweavers

412 search results - page 35 / 83
» Random Key Predistribution Schemes for Sensor Networks
Sort
View
111
Voted
TMC
2010
138views more  TMC 2010»
15 years 25 days ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
ICASSP
2009
IEEE
15 years 9 months ago
Predictive power control and multiple-description coding for wireless sensor networks
We study state estimation via wireless sensor networks over fading channels affected by random packet loss. In the configuration examined, the sensors send their measurements to ...
Jan Østergaard, Daniel E. Quevedo, Anders A...
MOBICOM
2003
ACM
15 years 7 months ago
Range-free localization schemes for large scale sensor networks
Wireless Sensor Networks have been proposed for a multitude of location-dependent applications. For such systems, the cost and limitations of the hardware on sensing nodes prevent...
Tian He, Chengdu Huang, Brian M. Blum, John A. Sta...
IPPS
2008
IEEE
15 years 9 months ago
Mobility control schemes with quick convergence in wireless sensor networks
In the near future, wireless sensor networks (WSN) performing sensing and communication tasks will be widely deployed as technology rapidly advances. Communication is one of the e...
Xiao Chen, Zhen Jiang, Jie Wu
IJSNET
2006
106views more  IJSNET 2006»
15 years 2 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue