Sciweavers

6122 search results - page 119 / 1225
» Securing network access in wireless sensor networks
Sort
View
AINA
2004
IEEE
15 years 8 months ago
Performance Improvement for GPRS, WLAN Integration using Ad Hoc Networks
As the wireless technology evolves, one can access the Internet almost everywhere via many wireless access networks such as wireless LAN and GPRS. People would like to use the wir...
Jui-Ming Chen, Li-Der Chou
ICPPW
2008
IEEE
15 years 10 months ago
Energy Modeling of Processors in Wireless Sensor Networks Based on Petri Nets
Power minimization is a serious issue in wireless sensor networks to extend the lifetime and minimize costs. However, in order to gain an accurate understanding of issues regardin...
Ali Shareef, Yifeng Zhu
GLOBECOM
2010
IEEE
15 years 2 months ago
ATMA: Advertisement-Based TDMA Protocol for Bursty Traffic in Wireless Sensor Networks
Energy conservation is one of the primary goals of the majority of MAC protocols designed for wireless sensor networks. In Sensor-MAC (S-MAC), one of the first MAC protocols design...
Surjya Sarathi Ray, Ilker Demirkol, Wendi Rabiner ...
ICCSA
2010
Springer
15 years 11 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
JCIT
2008
138views more  JCIT 2008»
15 years 4 months ago
Enhancing the Routing Performance of Wireless Sensor Networks using Connected Dominating Sets
Many prominent applications in wireless sensor networks require collected information has to be routed to end nodes in an efficient manner. In general, Connected Dominating Set (C...
B. Paramasivan, Mohaideen Pitchai, Radha Krishnan