Sciweavers

2282 search results - page 125 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 11 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
129
Voted
NPC
2004
Springer
15 years 10 months ago
Accurate Emulation of Wireless Sensor Networks
Abstract. Wireless sensor networks (WSNs) have a wide range of useful, datacentric applications, and major techniques involved in these applications include in-network query proces...
Hejun Wu, Qiong Luo, Pei Zheng, Bingsheng He, Lion...
132
Voted
CONEXT
2006
ACM
15 years 10 months ago
A WSN platform to support middleware development
According to the application domain, Wireless Sensor Networks (WSNs) differ in a number of ways (e. g., deployment strategy, node mobility, available resources, node heterogeneity...
André Rodrigues
DASFAA
2006
IEEE
174views Database» more  DASFAA 2006»
15 years 8 months ago
Communication-Efficient Implementation of Range-Joins in Sensor Networks
Sensor networks are multi-hop wireless networks of resource constrained sensor nodes used to realize high-level collaborative sensing tasks. To query and access data generated and ...
Aditi Pandit, Himanshu Gupta
ICC
2007
IEEE
157views Communications» more  ICC 2007»
15 years 11 months ago
Providing Transparent Security Services to Sensor Networks
— In this paper we introduce a link layer security platform for wireless sensor networks. At the heart of this platform, lies our key management module facilitating an efficient...
Hamed Soroush, Mastooreh Salajegheh, Tassos Dimitr...