• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 51
Next 10 →

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law

Secure and Privacy-Aware Data Collection in . . .

by Ioana Rodhe , 2012
"... A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to ..."
Abstract - Add to MetaCart
A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node

LEDS: Providing Location-aware End-to-end Data Security

by Kui Ren - in Wireless Sensor Networks,” In Proc. of IEEE INFOCOM’06 , 2006
"... Abstract — Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider att ..."
Abstract - Cited by 51 (9 self) - Add to MetaCart
Abstract — Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider

Analyzing the Impact of Wormhole Attack on Routing Protocol in Wireless Sensor Network on Behalf of packet tunnel, dropped and intercepted

by Er. Gurjot Singh, Er. Gurpreet Kaur
"... Abstract — A Wireless Sensor Network can be defined as a group of independent nodes, communicating wirelessly over limited frequency and bandwidth. The novelty of WSNs in comparison to traditional sensor networks is that they depend on dense deployment and coordination to execute their tasks success ..."
Abstract - Add to MetaCart
Abstract — A Wireless Sensor Network can be defined as a group of independent nodes, communicating wirelessly over limited frequency and bandwidth. The novelty of WSNs in comparison to traditional sensor networks is that they depend on dense deployment and coordination to execute their tasks

A Fairness-Aware Congestion Control Scheme in Wireless Sensor Networks

by Xiaoyan Yin, Student Member, Xingshe Zhou, Rongsheng Huang, Student Member, Yuguang Fang, Shining Li - IEEE Transactions on Vehicular Technology
"... Abstract—The event-driven nature of wireless sensor networks (WSNs) leads to unpredictable network load. As a result, conges-tion may occur at sensors that receive more data than they can forward, which causes energy waste, throughput reduction, and packet loss. In this paper, we propose a rate-base ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Abstract—The event-driven nature of wireless sensor networks (WSNs) leads to unpredictable network load. As a result, conges-tion may occur at sensors that receive more data than they can forward, which causes energy waste, throughput reduction, and packet loss. In this paper, we propose a rate

Localized QoS-aware Media Access Control in High-fidelity Data Center Sensing Networks

by Renjie Huang, Wen-zhan Song, Mingsen Xu, Behrooz Shirazi - Proceedings of the International Conference on Green Computing
"... Abstract-Low-cost non-intrusive wireless sensor network is ideal for high-fidelity data center monitoring and helping improve energy efficiency. However, the stringent quality of service (QoS) reqnirements such as real-time data delivery to gether with the dynamic nature of low-power wireless commu ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract-Low-cost non-intrusive wireless sensor network is ideal for high-fidelity data center monitoring and helping improve energy efficiency. However, the stringent quality of service (QoS) reqnirements such as real-time data delivery to gether with the dynamic nature of low-power wireless commu

Design of an Adaptive Coal Mine Rescue Robot using Wireless Sensor Networks

by V. Gomathi Ph. D, Sowmeya S, Avudaiammal P. S, Ganeshia R
"... In early decades, rescue operation in coal mine was treated as a dangerous task. After explosions occur, when rescue workers get into the tunnel without environment conditional awareness, they are facing heavy damages due to consecutive explosions [1]. This bring the necessity to detect the status o ..."
Abstract - Add to MetaCart
of the mine environment details such as toxic gases, high temperatures through wireless sensors to perform remote inspection of mine conditions, before trapped into the collapsed tunnel. Hence, this paper aims to design an adaptive coal mine rescue robot using Wireless Sensor Network (WSN). The test bed

in Wireless Ad Hoc Networks

by Radha Poovendran, Loukas Lazos
"... Wireless ad hoc networks are envisioned to be randomly deployed in versatile and potentially hostile environments. Hence, providing secure and uninterrupted communication between the un-tethered network nodes becomes a critical problem. In this paper, we investigate the wormhole attack in wireless a ..."
Abstract - Add to MetaCart
Wireless ad hoc networks are envisioned to be randomly deployed in versatile and potentially hostile environments. Hence, providing secure and uninterrupted communication between the un-tethered network nodes becomes a critical problem. In this paper, we investigate the wormhole attack in wireless

Analysis of Detecting Wormhole Attack in Wireless Networks

by Khin Sandar Win - World Academy of Science, Engineering and Technology , 2008
"... Abstract—In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Abstract—In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher

Energy Efficient Cluster-Based Intrusion Detection System for Wireless Sensor Networks

by Manal Abdullah, Ebtesam Alsanee, Nada Alseheymi
"... Abstract—Wireless sensor networks (WSNs) are network type where sensors are used to collect physical measurements. It has many application areas such as healthcare, weather monitoring and even military applications. Security in this kind of networks is a big concern especially in the applications th ..."
Abstract - Add to MetaCart
Abstract—Wireless sensor networks (WSNs) are network type where sensors are used to collect physical measurements. It has many application areas such as healthcare, weather monitoring and even military applications. Security in this kind of networks is a big concern especially in the applications
Next 10 →
Results 1 - 10 of 51
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University