Sciweavers

1423 search results - page 20 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
JSAC
2006
127views more  JSAC 2006»
13 years 6 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
TC
2011
13 years 1 months ago
Complexity of Data Collection, Aggregation, and Selection for Wireless Sensor Networks
— Processing the gathered information efficiently is a key functionality for wireless sensor networks. In this article, we study the time complexity, message complexity (number ...
Xiang-Yang Li, Yajun Wang, Yu Wang
PEWASUN
2006
ACM
14 years 21 days ago
Coordinated data aggregation in wireless sensor networks using the Omega failure detector
We present an algorithm implementing the failure detector class omega (Ω) in the crash-recovery model to coordinate data aggregation in wireless sensor networks. In order to mini...
Mikel Larrea, Cristian Martín, José ...
JPDC
2007
209views more  JPDC 2007»
13 years 6 months ago
Application-aware integration of data collection and power management in wireless sensor networks
Sensors are typically deployed to gather data about the physical world and its artifacts for a variety of purposes that range from environment monitoring, control, to data analysi...
Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian
COLCOM
2007
IEEE
14 years 1 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...