Sciweavers

2705 search results - page 34 / 541
» Splitting the sensor node
Sort
View
162
Voted
WIMOB
2007
IEEE
15 years 8 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
CORR
2008
Springer
128views Education» more  CORR 2008»
15 years 2 months ago
Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes
We study sensor networks with energy harvesting nodes. The generated energy at a node can be stored in a buffer. A sensor node periodically senses a random field and generates a pa...
Vinod Sharma, Utpal Mukherji, Vinay Joseph
CN
2006
85views more  CN 2006»
15 years 2 months ago
An efficient heuristic for selecting active nodes in wireless sensor networks
Energy saving is a paramount concern in wireless sensor networks (WSNs). A strategy for energy saving is to cleverly manage the duty cycle of sensors, by dynamically activating di...
Flávia Coimbra Delicato, Fábio Prott...
134
Voted
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 9 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
SASN
2006
ACM
15 years 8 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi