Sciweavers

6122 search results - page 170 / 1225
» Securing network access in wireless sensor networks
Sort
View
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 11 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
ADHOC
2008
96views more  ADHOC 2008»
15 years 4 months ago
Network configuration for optimal utilization efficiency of wireless sensor networks
This paper addresses the problem of configuring wireless sensor networks (WSNs). Specifically, we seek answers to the following questions: how many sensors should be deployed, wha...
Yunxia Chen, Chen-Nee Chuah, Qing Zhao
152
Voted
ICC
2007
IEEE
185views Communications» more  ICC 2007»
15 years 11 months ago
Maximal Lifetime Rate and Power Allocation for Sensor Networks with Data Distortion Constraints
— We address a lifetime maximization problem for a single-hop wireless sensor network where multiple sensors encode and communicate their measurements of a Gaussian random source...
James C. F. Li, Subhrakanti Dey, Jamie S. Evans
148
Voted
ICC
2007
IEEE
157views Communications» more  ICC 2007»
15 years 11 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon
ICWN
2007
15 years 6 months ago
PBR: Priority Based Routing in Multi-Sink Sensor Networks
- Wireless sensor networks have been widely used in many fields with the developments of the related techniques. But there are many problems in traditional single sink sensor netwo...
Min Meng, Hui Xu, Xiaoling Wu, Brian J. d'Auriol, ...