Sciweavers

2282 search results - page 112 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
INFOCOM
2011
IEEE
14 years 8 months ago
Optimal multiple-coverage of sensor networks
—In wireless sensor networks, multiple-coverage, in which each point is covered by more than one sensor, is often required to improve detection quality and achieve high fault tol...
Xiaole Bai, Ziqiu Yun, Dong Xuan, Biao Chen, Wei Z...
168
Voted
DCOSS
2008
Springer
15 years 6 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
MOBIHOC
2004
ACM
16 years 4 months ago
Rate allocation in wireless sensor networks with network lifetime requirement
An important performance consideration for wireless sensor networks is the amount of information collected by all the nodes in the network over the course of network lifetime. Sin...
Yiwei Thomas Hou, Yi Shi, Hanif D. Sherali
132
Voted
ENTCS
2007
95views more  ENTCS 2007»
15 years 4 months ago
Rijndael for Sensor Networks: Is Speed the Main Issue?
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. In previous works, Rijndael has not been considered a suitable encryption algor...
Andrea Vitaletti, Gianni Palombizio
EUROPAR
2007
Springer
15 years 10 months ago
Securing Sensor Reports in Wireless Sensor Networks*
Abstract. The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and ...
Al-Sakib Khan Pathan, Choong Seon Hong