Results 1 - 10
of
51
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law
Secure and Privacy-Aware Data Collection in . . .
, 2012
"... A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to ..."
Abstract
- Add to MetaCart
A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node
LEDS: Providing Location-aware End-to-end Data Security
- in Wireless Sensor Networks,” In Proc. of IEEE INFOCOM’06
, 2006
"... Abstract — Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider att ..."
Abstract
-
Cited by 51 (9 self)
- Add to MetaCart
Abstract — Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider
Analyzing the Impact of Wormhole Attack on Routing Protocol in Wireless Sensor Network on Behalf of packet tunnel, dropped and intercepted
"... Abstract — A Wireless Sensor Network can be defined as a group of independent nodes, communicating wirelessly over limited frequency and bandwidth. The novelty of WSNs in comparison to traditional sensor networks is that they depend on dense deployment and coordination to execute their tasks success ..."
Abstract
- Add to MetaCart
Abstract — A Wireless Sensor Network can be defined as a group of independent nodes, communicating wirelessly over limited frequency and bandwidth. The novelty of WSNs in comparison to traditional sensor networks is that they depend on dense deployment and coordination to execute their tasks
A Fairness-Aware Congestion Control Scheme in Wireless Sensor Networks
- IEEE Transactions on Vehicular Technology
"... Abstract—The event-driven nature of wireless sensor networks (WSNs) leads to unpredictable network load. As a result, conges-tion may occur at sensors that receive more data than they can forward, which causes energy waste, throughput reduction, and packet loss. In this paper, we propose a rate-base ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
Abstract—The event-driven nature of wireless sensor networks (WSNs) leads to unpredictable network load. As a result, conges-tion may occur at sensors that receive more data than they can forward, which causes energy waste, throughput reduction, and packet loss. In this paper, we propose a rate
Localized QoS-aware Media Access Control in High-fidelity Data Center Sensing Networks
- Proceedings of the International Conference on Green Computing
"... Abstract-Low-cost non-intrusive wireless sensor network is ideal for high-fidelity data center monitoring and helping improve energy efficiency. However, the stringent quality of service (QoS) reqnirements such as real-time data delivery to gether with the dynamic nature of low-power wireless commu ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract-Low-cost non-intrusive wireless sensor network is ideal for high-fidelity data center monitoring and helping improve energy efficiency. However, the stringent quality of service (QoS) reqnirements such as real-time data delivery to gether with the dynamic nature of low-power wireless commu
Design of an Adaptive Coal Mine Rescue Robot using Wireless Sensor Networks
"... In early decades, rescue operation in coal mine was treated as a dangerous task. After explosions occur, when rescue workers get into the tunnel without environment conditional awareness, they are facing heavy damages due to consecutive explosions [1]. This bring the necessity to detect the status o ..."
Abstract
- Add to MetaCart
of the mine environment details such as toxic gases, high temperatures through wireless sensors to perform remote inspection of mine conditions, before trapped into the collapsed tunnel. Hence, this paper aims to design an adaptive coal mine rescue robot using Wireless Sensor Network (WSN). The test bed
in Wireless Ad Hoc Networks
"... Wireless ad hoc networks are envisioned to be randomly deployed in versatile and potentially hostile environments. Hence, providing secure and uninterrupted communication between the un-tethered network nodes becomes a critical problem. In this paper, we investigate the wormhole attack in wireless a ..."
Abstract
- Add to MetaCart
Wireless ad hoc networks are envisioned to be randomly deployed in versatile and potentially hostile environments. Hence, providing secure and uninterrupted communication between the un-tethered network nodes becomes a critical problem. In this paper, we investigate the wormhole attack in wireless
Analysis of Detecting Wormhole Attack in Wireless Networks
- World Academy of Science, Engineering and Technology
, 2008
"... Abstract—In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
Abstract—In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher
Energy Efficient Cluster-Based Intrusion Detection System for Wireless Sensor Networks
"... Abstract—Wireless sensor networks (WSNs) are network type where sensors are used to collect physical measurements. It has many application areas such as healthcare, weather monitoring and even military applications. Security in this kind of networks is a big concern especially in the applications th ..."
Abstract
- Add to MetaCart
Abstract—Wireless sensor networks (WSNs) are network type where sensors are used to collect physical measurements. It has many application areas such as healthcare, weather monitoring and even military applications. Security in this kind of networks is a big concern especially in the applications
Results 1 - 10
of
51