Sciweavers

6122 search results - page 143 / 1225
» Securing network access in wireless sensor networks
Sort
View
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 11 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
IOR
2008
148views more  IOR 2008»
15 years 4 months ago
A Game-Theoretic Approach to Efficient Power Management in Sensor Networks
Wireless sensor networks pose numerous fundamental coordination problems. For instance, in a number of application domains including homeland security, environmental monitoring an...
Enrique Campos-Náñez, Alfredo Garcia...
EWSN
2006
Springer
16 years 4 months ago
PAQ: Time Series Forecasting for Approximate Query Answering in Sensor Networks
In this paper, we present a method for approximating the values of sensors in a wireless sensor network based on time series forecasting. More specifically, our approach relies on ...
Daniela Tulone, Samuel Madden
JCS
2007
84views more  JCS 2007»
15 years 4 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu
ICWN
2008
15 years 5 months ago
Reliability Challenges and Enhancement Approaches for Pipeline Sensor and Actor Networks
- Sensor and actor networks are used to monitor and control pipeline infrastructures. This paper discusses and compares different sensor and actor network architectures for water, ...
Nader Mohamed, Imad Jawhar, Khaled Shuaib