Sciweavers

606 search results - page 50 / 122
» Towards Survivable and Secure Wireless Sensor Networks
Sort
View
TMC
2010
190views more  TMC 2010»
13 years 7 months ago
SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas
—Wireless sensor networks have been used to gather data and information in many diverse application settings. The capacity of such networks remains a fundamental obstacle toward ...
Emad Felemban, Serdar Vural, Robert Murawski, Eyle...
AINA
2009
IEEE
14 years 3 months ago
Distributed Search for Balanced Energy Consumption Spanning Trees in Wireless Sensor Networks
— Sensor networks are commonly used for security and surveillance applications. As sensor nodes have limited battery paower, computing, and storage resources, the energy efficie...
Andrei Gagarin, Sajid Hussain, Laurence Tianruo Ya...
COLCOM
2005
IEEE
14 years 2 months ago
"Token" equilibria in sensor networks with multiple sponsors
When two sponsoring organizations, working towards separate goals, can employ wireless sensor networks for a finite period of time, it can be efficiency-enhancing for the sponso...
David A. Miller, Sameer Tilak, Tony Fountain
ISI
2006
Springer
13 years 8 months ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...
LCN
2006
IEEE
14 years 2 months ago
Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks
Security has become a major concern for many realworld applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all th...
Martin Passing, Falko Dressler