Sciweavers

1748 search results - page 48 / 350
» Service Discovery Protocol in Wireless Sensor Networks
Sort
View
ADHOCNETS
2009
Springer
14 years 2 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
INFOCOM
2008
IEEE
14 years 1 months ago
BodyQoS: Adaptive and Radio-Agnostic QoS for Body Sensor Networks
—As wireless devices and sensors are increasingly deployed on people, researchers have begun to focus on wireless body-area networks. Applications of wireless body sensor network...
Gang Zhou, Jian Lu, Chieh-Yih Wan, Mark D. Yarvis,...
WCNC
2008
IEEE
14 years 1 months ago
Testbed Implementation of a Secure Flooding Time Synchronization Protocol
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shan...
ICN
2005
Springer
14 years 28 days ago
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
Adrian Carlos Ferreira, Marcos Aurélio Vila...
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 7 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan