Sciweavers

346 search results - page 40 / 70
» Redundant Coverage in Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 2 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
EWSN
2007
Springer
14 years 7 months ago
Decentralized Scattering of Wake-Up Times in Wireless Sensor Networks
Duty-cycling in wireless sensor networks (WSNs) has both beneficial effects on network lifetime and negative effects on application performance due to the inability of a sensor to ...
Alessandro Giusti, Amy L. Murphy, Gian Pietro Picc...
ATAL
2008
Springer
13 years 10 months ago
A mobile agent approach to opportunistic harvesting in wireless sensor networks
This demonstration illustrates the feasibility of harvesting data from a WSN by interested parties, either in the WSN coverage area or in a remote location. Embedded and mobile ag...
Richard Tynan, Conor Muldoon, Michael J. O'Grady, ...
GLOBECOM
2008
IEEE
14 years 2 months ago
Modeling Mobility-Assisted Data Collection in Wireless Sensor Networks
—Exploiting mobility to enhance the performance of wireless sensor networks (WSNs), in terms of connectivity, coverage, and lifetime elongation, has recently been the focus of se...
Hisham M. Almasaeid, Ahmed E. Kamal
GLOBECOM
2007
IEEE
14 years 2 months ago
Improving Connectivity via Relays Deployment in Wireless Sensor Networks
Abstract— Enhancing the connectivity of wireless sensor networks is necessary to avoid the occurrence of coverage gaps. In this paper, we aim at improving the network connectivit...
Ahmed S. Ibrahim, Karim G. Seddik, K. J. Ray Liu