Results 211 to 220 of about 101,993 (245)
Some of the next articles are maybe not open access.

ES-WSN: Energy Efficient by Switching between Roles of Nodes in WSNs

2015 IEEE Global Communications Conference (GLOBECOM), 2014
The objective of our work is to propose a new approach called ES-WSN (Energy Efficiency by Switching between roles in WSNs) for the efficient use of energy in wireless sensor networks (WSN). Our solution ES-WSN extends the lifetime of the nodes in the network and guarantees a fair evolution of their level of energy.
Hamrioui, Sofiane, Lorenz, Pascal
openaire   +2 more sources

Collaborative authentication in unattended WSNs

Proceedings of the second ACM conference on Wireless network security, 2009
An unattended wireless sensor network (UWSN) might collect valuable data representing an attractive target for the adversary. Since a sink visits the network infrequently, unattended sensors cannot immediately off-load data to some safe external entity.
Pietro R. D.   +3 more
openaire   +4 more sources

Cryptography in WSNs

2019
Cryptography is the field for mathematically transforming messages to protect their confidentiality from eavesdropping. It is an essential foundation for all secure protocols. This chapter is a concise review of cryptography used in wireless sensor networks (WSNs) beginning with background on symmetric key encryption and the Diffie–Hellman key ...
Thomas M. Chen   +2 more
openaire   +1 more source

Towards realistic WSN evaluation

Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization, 2011
This work-in-progress presents our efforts on enabling on the credible evaluation of Wireless Sensor Networks (WSN) using the three basic evaluation environments available in this field: real-world deployments, testbeds, and simulators. The ultimate goal of this work is to define a complete set of realistic simulation and evaluation models for WSNs ...
Garg K.   +3 more
openaire   +1 more source

WSNs Energy Testbeds

2020
Testbeds are representative of WSNs, they support the diversity of their hardware and software constituents, they are deployed in the same conditions and would be environment, they make use of the protocols to be used at a larger scale. Testbeds are intended to safeguard would be implemented WSNs from malfunctions that may not be seen in theoretical ...
openaire   +1 more source

Security in WSNs

2016
Security in wireless sensor networks (WSNs) is centered on six fundamental requirements namely, authentication, confidentiality, integrity, reliability, availability and data freshness [4, 39, 52, 62]. In this chapter, we describe these requirements, the different kinds of attacks that aim to compromise these requirements (and hence the security of a ...
Rastko R. Selmic   +2 more
openaire   +1 more source

WSN Security

2022
Gaytri Bakshi, Himanshu Sahu
openaire   +1 more source

WSN-Based Audio Surveillance Systems

2009
This work focuses on the analysis of fundamental issues which have to be considered in order to obtain voice from a wireless sensor network (WSN). The latter is assumed to be constituted by MicaZ wireless sensor nodes. Problems related to the transport of an audio signal through a wireless channel and sensor nodes are thus analyzed, and a project for ...
GRAZIOSI, FABIO   +4 more
openaire   +2 more sources

Testbeds for WSNs

2016
Testbeds are representative of WSNs, they support the diversity of their hardware and software constituents, they are deployed in the same conditions and would be environment, they make use of the protocols to be used at a larger scale. Testbeds are intended to safeguard would be implemented WSNs from malfunctions that may not be seen in theoretical ...
openaire   +1 more source

WSN Application Scenarios

2008
Wireless sensor network (WSN) technology is a new and modern technology that has already been implemented in a wide variety of scenarios, and its applications are growing every day. As models for mobile wireless networking become more popular, their appeal comes from the fact that they can operate autonomously without the need for an existing ...
Ana-Belén García-Hernando   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy