Showing 41 - 60 results of 654 for search '"wireless sensor network"', query time: 0.07s Refine Results
  1. 41

    On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas by Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

    Published 2013-08-01
    “…The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. …”
    Get full text
    Article
  2. 42

    Contribution of wireless sensor networks in domestic and hostile environment by Natalja Osintsev

    Published 2023-03-01
    “…Wireless Sensor Networks are considered to be among the most rapidly evolving technological domains thanks to the numerous benefits that their usage provides. …”
    Get full text
    Article
  3. 43
  4. 44
  5. 45

    Enabling Collaborative Musical Activities through Wireless Sensor Networks by Santiago J. Barro, Tiago M. Fernández-Caramés, Carlos J. Escudero

    Published 2012-03-01
    “…On the other hand, the capabilities of WSN (wireless sensor networks) allow developers to build up more complex applications, since nodes have the ability of autoidentifying, autoconfiguring, and establishing associations with other nodes, behaving in a smarter way than other networks. …”
    Get full text
    Article
  6. 46
  7. 47

    Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks by Noureddine Assad, Brahim Elbhiri, Moulay Ahmed Faqihi, Mohamed Ouadou, Driss Aboutajdine

    Published 2015-01-01
    “…The intrusion detection application in a homogeneous wireless sensor network is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers in a field of interest. …”
    Get full text
    Article
  8. 48

    Difference between Domestic and Hostile Applications of Wireless Sensor Networks by Haoran Yu

    Published 2022-12-01
    Subjects: “…wireless sensor network…”
    Get full text
    Article
  9. 49
  10. 50

    Detecting and Defending against Replication Attacks in Wireless Sensor Networks by Xiang-yi Chen, Li-xia Meng, Yong-zhao Zhan

    Published 2013-06-01
    “…Wireless sensor networks are susceptible to node replication attacks due to their unattended nature. …”
    Get full text
    Article
  11. 51

    Comparison Between Domestic and Hostile Applications of Wireless Sensor Networks by Salwa El-Morsy

    Published 2022-03-01
    “…Applicating them over a wide area is quite a tough task, Hence the idea of Wireless Sensors Networking has been introduced. This idea has boosted the success rate of different experiments in the fields of health, Finance, Security, etc. where simple factors like temperature, motion, smoke, pressure etc. are used to muster the required data. …”
    Get full text
    Article
  12. 52

    Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks by Imanishimwe Jean de Dieu, Nyirabahizi Assouma, Maniraguha Muhamad, Wang Jin, Sungyoung Lee

    Published 2012-04-01
    “…To collect the data and transmit them on the base station is the main task of the sensor nodes in wireless sensor networks (WSNs). This transmission requires a specific routing algorithm. …”
    Get full text
    Article
  13. 53

    Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks by Tamás Holczer, Levente Buttyán

    Published 2011-10-01
    “…In this paper, we propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyber-physical systems. …”
    Get full text
    Article
  14. 54

    Intrusion Detection Systems in Wireless Sensor Networks: A Review by Nabil Ali Alrajeh, S. Khan, Bilal Shams

    Published 2013-05-01
    “…Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. …”
    Get full text
    Article
  15. 55

    An Improved 3D Localization Algorithm for the Wireless Sensor Network by Yan Xu, Yi Zhuang, Jing-jing Gu

    Published 2015-06-01
    “…Location information is crucial in the wireless sensor network. The nodes in wireless sensor networks are often deployed in the three-dimensional scenario. …”
    Get full text
    Article
  16. 56

    An Autonomous Packet Transmission Strategy for Opportunistic Wireless Sensor Networks by Hakki Soy, Özgür Özdemir, Mehmet Bayrak

    Published 2012-11-01
    “…We consider a wireless sensor network that comprises a single hop between the sensor nodes and the central controller node with multiple antennas. …”
    Get full text
    Article
  17. 57

    Control Theory-Based Load Balancing for Wireless Sensor Network by Sanqi Zhou, Yinchao Chen

    Published 2014-03-01
    “…Wireless sensor networks have been widely studied for decades. …”
    Get full text
    Article
  18. 58

    Random Walk Based Location Prediction in Wireless Sensor Networks by Zhaoyan Jin, Dianxi Shi, Quanyuan Wu, Huining Yan

    Published 2013-12-01
    “…With the development of wireless sensor network (WSN) technologies, WSNs have been applied in many areas. …”
    Get full text
    Article
  19. 59
  20. 60

    DS+: Reliable Distributed Snapshot Algorithm for Wireless Sensor Networks by Gamze Uslu, Kemal Cagri Serdaroglu, Sebnem Baydere

    Published 2013-01-01
    “…Acquiring the snapshot of a distributed system helps gathering system related global state. In wireless sensor networks (WSNs), global state shows if a node is terminated or deadlock occurs along with many other situations which prevents a WSN from fully functioning. …”
    Get full text
    Article