Sciweavers

500 search results - page 28 / 100
» Securing Topology Maintenance Protocols for Sensor Networks
Sort
View
VTC
2008
IEEE
158views Communications» more  VTC 2008»
14 years 4 months ago
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks
Abstract— Balancing energy consumption and prolonging network lifetime are open challenges in Wireless Sensor Networks. In this paper, we design a novel load balanced routing pro...
Chengjie Wu, Ruixi Yuan, Hongchao Zhou
IPSN
2003
Springer
14 years 3 months ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
CONCUR
2009
Springer
14 years 5 months ago
Query-Based Model Checking of Ad Hoc Network Protocols
Abstract. A prominent source of complexity in the verification of ad hoc network (AHN) protocols is the fact that the number of network topologies grows exponentially with the squ...
Anu Singh, C. R. Ramakrishnan, Scott A. Smolka
ESOA
2006
14 years 2 months ago
ASOS: An Adaptive Self-organizing Protocol for Surveillance and Routing in Sensor Networks
We present a simple model of self-organization for sensor networks that addresses two conflicting requirements: hazard situations should be reported to a sink node with as little ...
Jorge Simão
ESAS
2007
Springer
14 years 2 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer