Sciweavers

6122 search results - page 96 / 1225
» Securing network access in wireless sensor networks
Sort
View
PERCOM
2009
ACM
15 years 11 months ago
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
COMCOM
2006
62views more  COMCOM 2006»
15 years 4 months ago
Self-monitoring of wireless sensor networks
This paper presents an efficient distributed self-monitoring mechanism for a class of wireless sensor networks used for monitoring and surveillance. In these applications, it is i...
Chih-fan Hsin, Mingyan Liu
140
Voted
BIRTHDAY
2010
Springer
15 years 3 months ago
Towards Declarative Query Scoping in Sensor Networks
Abstract. In the last decade, several large-scale wireless sensor networks have been deployed to monitor a variety of environments. The declarative nature of the database approach ...
Daniel Jacobi, Pablo Ezequiel Guerrero, Khalid Naw...
COMCOM
2007
156views more  COMCOM 2007»
15 years 3 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis
154
Voted
MASS
2010
181views Communications» more  MASS 2010»
15 years 2 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer