Sciweavers

110 search results - page 3 / 22
» Architecture of Wireless Sensor Node using Novel Ultra-Wideb...
Sort
View
GLOBECOM
2007
IEEE
13 years 11 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
MOBIHOC
2007
ACM
14 years 4 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
IPSN
2005
Springer
13 years 10 months ago
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
— Sensor networks pose security and privacy challenges. One challenge is how to bootstrap secure communications among nodes. Several key pre-distribution schemes have been propos...
Zhen Yu, Yong Guan
EUC
2008
Springer
13 years 7 months ago
A Collaboration-based Storage Management Scheme in Multimedia Sensor Networks
Data gathering is a common but critical operation in many applications of wireless sensor networks. The innovative techniques that improve energy efficiency to prolong the network ...
Yunpei Yan, Guihai Chen, Sajal K. Das
GLOBECOM
2006
IEEE
13 years 11 months ago
A Novel Systematic Resource Transfer Method for Wireless Sensor Networks
— The use of wireless sensor networks for gathering environmental and safety-critical data in real time is increasing at a rapid rate. Some of the main criteria in designing sens...
Winnie Louis Lee, Amitava Datta, Rachel Cardell-Ol...