Sciweavers

529 search results - page 50 / 106
» Cluster based Key Management in Wireless Sensor Networks
Sort
View
ICNP
2003
IEEE
15 years 3 months ago
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
In current sensor networks, sensor nodes are capable of not only measuring real world phenomena, but also storing, processing and transferring these measurements. Many data dissem...
Wensheng Zhang, Guohong Cao, Thomas F. La Porta
DCOSS
2005
Springer
15 years 3 months ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...
MONET
2006
173views more  MONET 2006»
14 years 9 months ago
Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks
We analyze an architecture based on mobility to address the problem of energy efficient data collection in a sensor network. Our approach exploits mobile nodes present in the senso...
Sushant Jain, Rahul Shah, Waylon Brunette, Gaetano...
IJSN
2006
116views more  IJSN 2006»
14 years 9 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
JSAC
2006
127views more  JSAC 2006»
14 years 9 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang