Sciweavers

DSN
2005
IEEE
14 years 3 months ago
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
DEXAW
2005
IEEE
193views Database» more  DEXAW 2005»
14 years 3 months ago
Adaptive Distributed Indexing for Spatial Queries in Sensor Networks
Sensor networks have opened new horizons and opportunities for a variety of environmental monitoring, surveillance and healthcare applications. One of the major tasks of sensor ne...
Vladimir Dyo, Cecilia Mascolo
CEC
2005
IEEE
14 years 3 months ago
Localization using evolution strategies in sensornets
With the emergence of wireless sensor networks and pervasive computing, innovative location-aware technologies and services are being investigated. Several iterative approaches emp...
Mark Terwilliger, Ajay K. Gupta, Ashfaq A. Khokhar...
AINA
2005
IEEE
14 years 3 months ago
A Scheme for Testing Privacy State in Pervasive Sensor Networks
More and more sensor networks will be deployed in the place where people are living, studying, and working. These sensor networks bring us the convenience of accessing information...
Yingpeng Sang, Hong Shen
AICT
2005
IEEE
167views Communications» more  AICT 2005»
14 years 3 months ago
Passive Cluster Based Clock Synchronization in Sensor Network
Clock synchronization has paid a great magnitude of attention in the distributed systems. Sensor networks differ from traditional distributed system in many ways. One of the drama...
Md. Mamun-Or-Rashid, Choong Seon Hong, Chi Hyung I...
WS
2006
ACM
14 years 3 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
SENSYS
2006
ACM
14 years 3 months ago
The tenet architecture for tiered sensor networks
Most sensor network research and software design has been guided by an architectural principle that permits multi-node data fusion on small-form-factor, resource-poor nodes, or mo...
Omprakash Gnawali, Ki-Young Jang, Jeongyeup Paek, ...
SENSYS
2006
ACM
14 years 3 months ago
Supporting concurrent applications in wireless sensor networks
It is vital to support concurrent applications sharing a wireless sensor network in order to reduce the deployment and administrative costs, thus increasing the usability and efï¬...
Yang Yu, Loren J. Rittle, Vartika Bhandari, Jason ...
SENSYS
2006
ACM
14 years 3 months ago
Data collection in delay tolerant mobile sensor networks using SCAR
Cecilia Mascolo, Mirco Musolesi, Bence Pász...