Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 01 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
Data authenticity and availability in multihop wireless sensor networks
Article No.: 10, Pages 1–26https://doi.org/10.1145/2140522.2140523

Security services such as data confidentiality, authenticity, and availability are critical in wireless sensor networks (WSNs) deployed in adversarial environments. Due to the resource constrain's of sensor nodes, the existing protocols currently in use ...

research-article
Self-localizing smart camera networks
Article No.: 11, Pages 1–24https://doi.org/10.1145/2140522.2140524

This article describes a novel approach to localizing networks of embedded cameras and sensors. In this scheme, the cameras and the sensors are equipped with controllable light sources (either visible or infrared), which are used for signaling. Each ...

research-article
Delay optimal event detection on ad hoc wireless sensor networks
Article No.: 12, Pages 1–35https://doi.org/10.1145/2140522.2140525

We consider a small extent sensor network for event detection, in which nodes periodically take samples and then contend over a random access network to transmit their measurement packets to the fusion center. We consider two procedures at the fusion ...

research-article
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
Article No.: 13, Pages 1–13https://doi.org/10.1145/2140522.2140526

Broadcast is an efficient communication channel on wireless sensor networks. Through authentic broadcast, deployed sensors can perform legitimate actions issued by a base station. According to previous literature, a complete solution for authentic ...

research-article
Information-theoretic modeling of false data filtering schemes in wireless sensor networks
Article No.: 14, Pages 1–19https://doi.org/10.1145/2140522.2140527

False data filtering schemes are designed to filter out false data injected by malicious sensors; they keep the network immune to bogus event reports. Theoretic understanding of false data filtering schemes and guidelines to further improve their ...

research-article
Quantization, channel compensation, and optimal energy allocation for estimation in sensor networks
Article No.: 15, Pages 1–25https://doi.org/10.1145/2140522.2140528

In clustered networks of wireless sensors, each sensor collects noisy observations of the environment, quantizes these observations into a local estimate of finite length, and forwards them through one or more noisy wireless channels to the cluster head ...

research-article
Event prediction in a hybrid camera network
Article No.: 16, Pages 1–27https://doi.org/10.1145/2140522.2140529

Given a hybrid camera layout—one containing, for example, static and active cameras—and people moving around following established traffic patterns, our goal is to predict a subset of cameras, respective camera parameter settings, and future time ...

research-article
Utility-based bandwidth adaptation in mission-oriented wireless sensor networks
Article No.: 17, Pages 1–26https://doi.org/10.1145/2140522.2140530

This article develops a utility-based optimization framework for resource sharing by multiple competing missions in a mission-oriented wireless sensor network (WSN) environment. Prior work on network utility maximization (NUM) based optimization has ...

research-article
A dynamic programming approach to maximizing a statistical measure of the lifetime of sensor networks
Article No.: 18, Pages 1–21https://doi.org/10.1145/2140522.2140531

The inherent many-to-one flow of traffic in wireless sensor networks (WSNs) produces a skewed distribution of energy consumption rates, leading to the early demise of those sensors that are critical to the ability of surviving nodes to communicate their ...

Subjects

Comments