Sciweavers

6122 search results - page 155 / 1225
» Securing network access in wireless sensor networks
Sort
View
DCOSS
2010
Springer
15 years 7 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
SECON
2007
IEEE
15 years 10 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
PERCOM
2008
ACM
16 years 4 months ago
MyNet: A Platform for Secure P2P Personal and Social Networking Services
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
COMCOM
2008
76views more  COMCOM 2008»
15 years 4 months ago
A study of self-organization mechanisms in ad hoc and sensor networks
Self-organization is a great concept for building scalable systems consisting of a huge number of subsystems. The primary objectives are improved scalability and dynamic adaptatio...
Falko Dressler
INFOCOM
2002
IEEE
15 years 9 months ago
Bounding the Lifetime of Sensor Networks Via Optimal Role Assignments
— A key challenge in ad-hoc, data-gathering wireless sensor networks is achieving a lifetime of several years using nodes that carry merely hundreds of joules of stored energy. I...
Manish Bhardwaj, Anantha Chandrakasan