Sciweavers

80 search results - page 14 / 16
» Real-Time Detection of Clone Attacks in Wireless Sensor Netw...
Sort
View
SAINT
2008
IEEE
14 years 1 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki
ISCC
2009
IEEE
254views Communications» more  ISCC 2009»
14 years 2 months ago
Monitoring connectivity in wireless sensor networks
It is important to have continuous connectivity in a wireless sensor network after it is deployed in a hostile environment. However, such networks are constrained by the low usert...
Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, Da...
RTCSA
2005
IEEE
14 years 1 months ago
Embedded Sensing of Structures: A Reality Check
With the advent of miniaturized sensing technology, it has become possible to envision smart structures containing millions of sensors embedded in concrete for autonomously detect...
Krishna Chintalapudi, Jeongyeup Paek, Nupur Kothar...
RTSS
2003
IEEE
14 years 21 days ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
RTCSA
2005
IEEE
14 years 1 months ago
An Overview of the VigilNet Architecture
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Tian He, Liqian Luo, Ting Yan, Lin Gu, Qing Cao, G...