Sciweavers

5911 search results - page 102 / 1183
» Annealing Sensor Networks
Sort
View
148
Voted
WINET
2010
179views more  WINET 2010»
15 years 2 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
128
Voted
EWSN
2004
Springer
16 years 3 months ago
Design of a Secure Distributed Service Directory for Wireless Sensornetworks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. This paper presents the design of a general distributed service dir...
Erik-Oliver Blaß, Hans-Joachim Hof, Martina ...
141
Voted
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 10 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
147
Voted
EUC
2005
Springer
15 years 9 months ago
Coverage-Aware Sensor Engagement in Dense Sensor Networks
Wireless sensor networks are capable of carrying out surveillance missions for various applications in remote areas without human interventions. An essential issue of sensor netwo...
Jun Lu, Lichun Bao, Tatsuya Suda
145
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks
— A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. The data ...
Seema Bandyopadhyay, Edward J. Coyle