Sciweavers

170 search results - page 2 / 34
» A Rekey-Boosted Security Protocol in Hierarchical Wireless S...
Sort
View
CCS
2010
ACM
13 years 5 months ago
Efficient sensor node authentication via 3GPP mobile communication networks
Energy efficiency is one of important issues in the resource contrained wireless sensor network. In this paper, we propose the authentication and key agreement protocol that effic...
Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Sh...
JNW
2008
126views more  JNW 2008»
13 years 5 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 5 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
ADHOC
2005
165views more  ADHOC 2005»
13 years 5 months ago
A survey on routing protocols for wireless sensor networks
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Most of ...
Kemal Akkaya, Mohamed F. Younis
WINET
2010
224views more  WINET 2010»
13 years 3 months ago
Hierarchical geographic multicast routing for wireless sensor networks
Wireless sensor networks comprise typically dense deployments of large networks of small wireless capable sensor devices. In such networks, multicast is a fundamental routing servi...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...