Sciweavers

1056 search results - page 151 / 212
» Sentry-Based Power Management in Wireless Sensor Networks
Sort
View
171
Voted
WIMOB
2007
IEEE
15 years 9 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
PIMRC
2008
IEEE
15 years 10 months ago
A resource allocation scheme to achieve fairness in TH-UWB sensor networks with near-far effects
— The inherent near-far effect in wireless networks causes nodes that are further away from the receiver to suffer from throughput degradation, as packets from nodes that are nea...
Ghasem Naddafzadeh Shirazi, Peng Yong Kong, Hwee-X...
142
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang
163
Voted
SIES
2010
IEEE
15 years 1 months ago
An Energy-Aware Algorithm for TDMA MAC Protocols in Real-Time Wireless Networks
Abstract--In distributed embedded systems operated by battery, energy management is a critical issue that has to be addressed at different architecture levels. For systems that tig...
Gianluca Franchino, Giorgio C. Buttazzo, Mauro Mar...
112
Voted
IPSN
2010
Springer
15 years 10 months ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...