Sciweavers

688 search results - page 90 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
PERCOM
2010
ACM
13 years 10 months ago
Engineering energy-efficient target detection applications in Wireless Sensor Networks
This paper addresses the problem of engineering energy-efficient target detection applications using unattended Wireless Sensor Networks (WSNs) for long-lasting surveillance of are...
Paolo Medagliani, Jeremie Leguay, Vincent Gay, Mar...
IPPS
2006
IEEE
14 years 2 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
PIMRC
2008
IEEE
14 years 2 months ago
Dynamic data aggregation and transport in wireless sensor networks
—In wireless sensor networks, in-network aggregation is the process of compressing locally the data gathered by the sensor nodes, so that only the compressed data travel across s...
Mario O. Diaz, Kin K. Leung
IPSN
2004
Springer
14 years 1 months ago
Naps: scalable, robust topology management in wireless ad hoc networks
Topology management schemes conserve energy in wireless ad hoc networks by identifying redundant nodes that may turn off their radios or other components while maintaining connec...
Brighten Godfrey, David Ratajczak
ANSS
2007
IEEE
14 years 2 months ago
Scalable Data Collection Protocols for Wireless Sensor Networks with Multiple Mobile Sinks
Data propagation in wireless sensor networks is usually performed as a multihop process. To deliver a single message, the resources of many sensor nodes are used and a lot of ener...
Athanasios Kinalis, Sotiris E. Nikoletseas