Sciweavers

824 search results - page 3 / 165
» Deployment of Public-Key Infrastructure in Wireless Data Net...
Sort
View
IPSN
2007
Springer
13 years 12 months ago
Health monitoring of civil infrastructures using wireless sensor networks
A Wireless Sensor Network (WSN) for Structural Health Monitoring (SHM) is designed, implemented, deployed and tested on the 4200ft long main span and the south tower of the Golden...
Sukun Kim, Shamim Pakzad, David E. Culler, James D...
EWSN
2008
Springer
14 years 5 months ago
Que: A Sensor Network Rapid Prototyping Tool with Application Experiences from a Data Center Deployment
Several considerable impediments stand in the way of sensor network prototype applications that wish to realize sustained deployments. These are: scale, longevity, data of interest...
David Chu, Feng Zhao, Jie Liu, Michel Goraczko
MOBIHOC
2007
ACM
14 years 5 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
14 years 7 days ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
SAINT
2003
IEEE
13 years 11 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta