Sciweavers

348 search results - page 27 / 70
» Using Data Aggregation to Prevent Traffic Analysis in Wirele...
Sort
View
WICON
2008
13 years 9 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
CIDR
2007
185views Algorithms» more  CIDR 2007»
13 years 9 months ago
Rethinking Data Management for Storage-centric Sensor Networks
Data management in wireless sensor networks has been an area of significant research in recent years. Many existing sensor data management systems view sensor data as a continuou...
Yanlei Diao, Deepak Ganesan, Gaurav Mathur, Prasha...
SAC
2009
ACM
14 years 2 months ago
Geographical data collection in sensor networks with self-organizing transaction cluster-heads
This paper proposes 2G, a flexible and energy-efficient data collection protocol for sensor networks for increasing network lifetime. To this end, it integrates self-organizing d...
Neeraj Rajgure, Eric Platon, Cristian Borcea, Shin...
COMSWARE
2006
IEEE
14 years 1 months ago
Exploiting multi-channel clustering for power efficiency in sensor networks
Sensor networks typically comprise of a number of inexpensive small devices with processing, communication and sensing abilities that collaborate to perform a common task. Sensor d...
Ashima Gupta, Chao Gui, Prasant Mohapatra
PERCOM
2009
ACM
14 years 2 months ago
Using Situation Lattices in Sensor Analysis
Highly sensorised systems present two parallel challenges: how to design a sensor suite that can efficiently and cost-effectively support the needs of given services; and to extr...
Juan Ye, Lorcan Coyle, Simon Dobson, Paddy Nixon