Sciweavers

6122 search results - page 66 / 1225
» Securing network access in wireless sensor networks
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks
Many of the routing protocols that have been designed for wireless ad-hoc networks focus on energy-efficiency and guaranteeing high throughput in a non-adversarial setting. Howev...
Tanya Roosta, Sameer Pai, Phoebus Chen, Shankar Sa...
COMCOM
2007
149views more  COMCOM 2007»
13 years 7 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
14 years 7 months ago
System design issues in sensor databases
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...
Qiong Luo, Hejun Wu
CNSR
2010
IEEE
159views Communications» more  CNSR 2010»
13 years 10 months ago
Enforcing Fairness for Data Collection in Wireless Sensor Networks
The well known many
Md. Abdul Hamid, Muhammad Mahbub Alam, Md. Sharifu...
NETWORK
2006
83views more  NETWORK 2006»
13 years 7 months ago
A new model for updating software in wireless sensor networks
Wireless Sensor Networks (WSNs) are expected to be deployed for long periods of time, and the nodes are likely to need software updates during their lifetime, both for bug fixes a...
Stephen Brown, Cormac J. Sreenan