Sciweavers

11927 search results - page 62 / 2386
» Wireless Sensor Networks
Sort
View
WIMOB
2008
IEEE
14 years 3 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...
COMSUR
2011
263views Hardware» more  COMSUR 2011»
12 years 9 months ago
Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches
—Wireless sensor networks (WSNs) have been applied to many applications since emerging. Among them, one of the most important applications is Sensor Data Collections, where sense...
Feng Wang, Jiangchuan Liu
SASN
2004
ACM
14 years 2 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
SAC
2008
ACM
13 years 8 months ago
Sensor stream reduction for clustered wireless sensor networks
This work presents the use of sensor stream reduction algorithms in clustered wireless sensor networks (WSNs), where the cluster head node is responsible to reduce the amount of d...
André L. L. de Aquino, Carlos Mauricio S. F...
ICRA
2006
IEEE
145views Robotics» more  ICRA 2006»
14 years 3 months ago
Instrumenting Wireless Sensor Networks for Real-time Surveillance
— This paper considers the problem of tracking an unknown number of targets using a wireless sensor network for surveillance. In particular, we consider the case in which each se...
Songhwai Oh, Phoebus Chen, Michael Manzo, Shankar ...