Sciweavers

172 search results - page 14 / 35
» ARMS: An Authenticated Routing Message in Sensor Networks
Sort
View
69
Voted
GI
2005
Springer
15 years 5 months ago
Entity Recognition for Sensor Network Motes
d Abstract) Stefan Lucks1 , Erik Zenner2 , Andr´e Weimerskirch3 , Dirk Westhoff4 1 Theoretische Informatik, University of Mannheim, Germany 2 Erik Zenner, Cryptico A/S, Copenhagen...
Stefan Lucks, Erik Zenner, André Weimerskir...
ADHOCNOW
2010
Springer
15 years 1 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
CDC
2008
IEEE
198views Control Systems» more  CDC 2008»
15 years 6 months ago
Performance analysis of different routing protocols in Wireless Sensor Networks for real-time estimation
— In this paper we analyze the performance of two different routing protocols specifically designed for Wireless Sensor Networks (WSNs) for real-time estimation, control, and mo...
Damiano Varagnolo, Phoebus Chen, Luca Schenato, Sh...
SSDBM
2007
IEEE
138views Database» more  SSDBM 2007»
15 years 5 months ago
Reliable Hierarchical Data Storage in Sensor Networks
The ability to provide reliable in-network storage while balancing the energy consumption of individual sensors is a primary concern when deploying a sensor network. The main conc...
Song Lin, Benjamin Arai, Dimitrios Gunopulos
ICW
2005
IEEE
209views Communications» more  ICW 2005»
15 years 5 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...