Sciweavers

JUCS
2010
217views more  JUCS 2010»
13 years 7 months ago
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
: The use of multimedia sensor nodes can significantly enhance the capability of wireless sensor networks (WSNs) for event description. In a number of scenarios, e.g., an erupting ...
Lei Shu, Manfred Hauswirth, Yan Zhang, Jianhua Ma,...
JIPS
2010
389views more  JIPS 2010»
13 years 7 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
TSMC
2011
355views more  TSMC 2011»
13 years 7 months ago
Particle Swarm Optimization in Wireless-Sensor Networks: A Brief Survey
—Wireless sensor networks (WSNs) are networks of autonomous nodes used for monitoring an environment. Developers of WSNs face challenges that arise from communication link failur...
Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy
MASCOTS
2010
13 years 11 months ago
Cluster-Based Correlated Data Gathering in Wireless Sensor Networks
—We consider the problem of optimal cluster-based data gathering in Wireless Sensor Networks (WSNs) when nearby readings are spatially correlated. Due to the dense nature of WSNs...
Ali Dabirmoghaddam, Majid Ghaderi, Carey L. Willia...
JCM
2007
98views more  JCM 2007»
14 years 10 days ago
A Fault Tolerance Management Framework for Wireless Sensor Networks
Abstract— Wireless Sensor Networks (WSNs) have the potential of significantly enhancing our ability to monitor and interact with our physical environment. Realizing a faulttoler...
Iman Saleh, Mohamed Eltoweissy, Adnan Agbaria, Hes...
ISI
2006
Springer
14 years 12 days ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...
IJSN
2006
93views more  IJSN 2006»
14 years 13 days ago
Limiting DoS attacks during multihop data delivery in wireless sensor networks
: Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs ar...
Jing Deng, Richard Han, Shivakant Mishra