Results 1 - 10
of
161
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
, 2002
"... This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect senso ..."
Abstract
-
Cited by 1517 (36 self)
- Add to MetaCart
This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect
The Deployment of a Smart Monitoring System using Wireless Sensors and Actuators Networks
"... Abstract—In this paper, we explore the implementation of a smart monitoring system over a wireless sensor network, with particular emphasis on the creation of a solid routing infrastructure through the Routing Protocol for Low-power and lossy networks (RPL), whose definition is currently being discu ..."
Abstract
- Add to MetaCart
Abstract—In this paper, we explore the implementation of a smart monitoring system over a wireless sensor network, with particular emphasis on the creation of a solid routing infrastructure through the Routing Protocol for Low-power and lossy networks (RPL), whose definition is currently being
Localization of Wireless Sensor Networks with a Mobile Beacon
, 2004
"... Wireless sensor networks have the potential to become the pervasive sensing (and actuating) technology of the future. For many applications, a large number of inexpensive sensors is preferable to a few expensive ones. The large number of sensors in a sensor network and most application scenarios pre ..."
Abstract
-
Cited by 115 (2 self)
- Add to MetaCart
Wireless sensor networks have the potential to become the pervasive sensing (and actuating) technology of the future. For many applications, a large number of inexpensive sensors is preferable to a few expensive ones. The large number of sensors in a sensor network and most application scenarios
Vigilnet: An Integrated Sensor Network System for Energy-Efficient Surveillance
- ACM Transaction on Sensor Networks
, 2006
"... This article describes one of the major efforts in the sensor network community to build an integrated sensor network system for surveillance missions. The focus of this effort is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve ..."
Abstract
-
Cited by 159 (36 self)
- Add to MetaCart
involve a high element of risk for human personnel and require a high degree of stealthiness. Hence, the ability to deploy unmanned surveillance missions, by using wireless sensor networks, is of great practical importance for the military. Because of the energy constraints of sensor devices, such systems
STCP: A Generic Transport Layer Protocol for Wireless Sensor Networks
- Proc. of IEEE Intl. Conf. on Computer Communications and Networks (ICCCN
, 2005
"... Abstract — We consider the issue of designing a generic transport layer protocol for energy-constrained sensor networks. We present the requirements for such a transport protocol and propose Sensor Transmission Control Protocol (STCP). STCP is a generic, scalable and reliable transport layer protoco ..."
Abstract
-
Cited by 56 (0 self)
- Add to MetaCart
protocol where a majority of the functionalities are implemented at the base station. STCP offers controlled variable reliability, congestion detection and avoidance, and supports multiple applications in the same network. We present the design and implementation of STCP and evaluate the protocol
INSENS: Intrusion-tolerant routing in wireless sensor networks”, In:
, 2002
"... Abstract: This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless sensor networks (WSNs). The key objective of an INSENS network is to tolerate damage caused by an intruder who ..."
Abstract
-
Cited by 107 (5 self)
- Add to MetaCart
Abstract: This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless sensor networks (WSNs). The key objective of an INSENS network is to tolerate damage caused by an intruder
Geocast for Wireless Sensor Networks
"... Abstract—An important but relatively less studied class of network layer protocol for sensor networks is geocast. It allows a sensor node to send messages to all nodes in a given geographical area without the sender node having any knowledge about which nodes are present in that area. Developing a r ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
robust geocast protocol for practical sensor networks poses several challenges. Geocast messages should be reliably delivered to the destination area in the presence of unreliable wireless links, a typical characteristic of practical sensor network deployments. The protocol should minimize the number
Sudoku: Secure and usable deployment of keys on wireless sensors
- In 6th IEEE Workshop on Secure Network Protocols (NPSec
, 2010
"... Abstract-Initial deployment of secrets plays a crucial role in any security design, but especially in hardware constrained wireless sensor networks. Many key management schemes assume either manually pre-installed shared secrets or keys authenticated with the aid of out-of-band channels. While manu ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
and experimentally evaluate the proposed key deployment protocol using commodity wireless sensor motes.
Wireless Sensor Networking in Challenging Environments
, 2014
"... This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact ..."
Abstract
- Add to MetaCart
This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact
and avoidance in Wireless Sensor Networks
"... consists of multiple low cost sensors, densely deployed to monitor a particular event. Each sensor is deployed in different location for different purpose. Because of the unbalanced conditions, results of a particular sensor or group of sensors might be manipulated. This might lead to inaccurate res ..."
Abstract
- Add to MetaCart
is to protect WSNs from such harmful attacks by using a trust based methodology. Evaluation result depends on the type of attack used. The performance is compared using the collection tree protocol. Index terms- Wireless Sensor Networks (WSNs), trust, Congestion.
Results 1 - 10
of
161