enter search term and/or author name
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
Peng Ning, An Liu, Wenliang Du
Article No.: 1
Broadcast authentication is a critical security service in wireless sensor networks. There are two general approaches for broadcast authentication in wireless sensor networks: digital signatures and μTESLA-based techniques. However, both...
Energy-efficient on-demand reprogramming of large-scale sensor networks
Mark D. Krasniewski, Rajesh Krishna Panta, Saurabh Bagchi, Chin-Lung Yang, William J. Chappell
Article No.: 2
As sensor networks operate over long periods of deployment in difficult to reach places, their requirements may change or new code may need to be uploaded to them. The current state-of-the-art protocols (Deluge and MNP) for network reprogramming...
In sensor network localization, multihop based approaches have been proposed to approximate the shortest paths to Euclidean distances between pairwise sensors. A good approximation can be achieved when sensors are densely deployed in a convex...
Efficient gathering of correlated data in sensor networks
Himanshu Gupta, Vishnu Navda, Samir Das, Vishal Chowdhary
Article No.: 4
In this article, we design techniques that exploit data correlations in sensor data to minimize communication costs (and hence, energy costs) incurred during data gathering in a sensor network. Our proposed approach is to select a small subset of...
Cluster-based congestion control for sensor networks
Kyriakos Karenos, Vana Kalogeraki, Srikanth V. Krishnamurthy
Article No.: 5
In wireless sensor networks, multiple flows from data collecting sensors to an aggregating sink could traverse paths that are largely interference coupled. These interference effects manifest themselves as congestion, and cause the flows to...