Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/3063
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Westhoff, Dirk | - |
dc.contributor.author | Armknecht, Frederik | - |
dc.contributor.author | Sirivianos, Michael | - |
dc.contributor.other | Σιριβιανός, Μιχάλης | - |
dc.date.accessioned | 2013-02-19T09:37:47Z | en |
dc.date.accessioned | 2013-05-17T05:33:57Z | - |
dc.date.accessioned | 2015-12-02T12:33:14Z | - |
dc.date.available | 2013-02-19T09:37:47Z | en |
dc.date.available | 2013-05-17T05:33:57Z | - |
dc.date.available | 2015-12-02T12:33:14Z | - |
dc.date.issued | 2007-04 | - |
dc.identifier.citation | 5th international symposium on modeling and optimization in mobile, ad hoc and wireless networks and workshops, WiOpt 2007, pp. 1-10 | en_US |
dc.identifier.isbn | 978-1-4244-0960-0 (print) | - |
dc.identifier.isbn | 978-1-4244-0961-7 (online) | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/3063 | - |
dc.description.abstract | Aggregator nodes commonly have the ability to read, corrupt or disrupt the flow of information produced by a wireless sensor network (WSN). Despite this fact, existing aggregator node election schemes do not address an adversary that strives to influence the election process towards candidate nodes that it controls. We discuss the requirements that need to be fulfilled by a non-manipulable aggregator node election protocol. We conclude that these requirements can be satisfied by a distributed random number generator function in which no node is able to determine the output of the function. We provide and compare three protocols that instantiate such function | en_US |
dc.language.iso | en | en_US |
dc.rights | © 2007 IEEE | en_US |
dc.subject | Wireless sensor networks | en_US |
dc.subject | Computer network protocols | en_US |
dc.subject | Computer science | en_US |
dc.subject | Energy consumption | en_US |
dc.subject | Ad hoc networks (Computer networks) | en_US |
dc.title | Non-manipulable aggregator node election protocols for wireless sensor networks | en_US |
dc.type | Book Chapter | en_US |
dc.affiliation | University of California | en |
dc.subject.category | Computer and Information Sciences | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.identifier.doi | 10.1109/WIOPT.2007.4480031 | en_US |
dc.dept.handle | 123456789/54 | en |
cut.common.academicyear | 2006-2007 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_3248 | - |
item.openairetype | bookPart | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-6500-581X | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Κεφάλαια βιβλίων/Book chapters |
CORE Recommender
SCOPUSTM
Citations
50
32
checked on Nov 9, 2023
Page view(s) 50
443
Last Week
3
3
Last month
3
3
checked on Nov 23, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.