Sciweavers

2282 search results - page 279 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
MASS
2010
156views Communications» more  MASS 2010»
15 years 2 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
OTM
2007
Springer
15 years 11 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
162
Voted
APNOMS
2008
Springer
15 years 7 months ago
A Logical Group Formation and Management Mechanism Using RSSI for Wireless Sensor Networks
Abstract. Wireless sensor network is a suitable technology for ubiquitous environment. However, in WSN, as the network size grows larger, overheads such as flooding, calculation an...
Jihyuk Heo, Jin Ho Kim, Choong Seon Hong
159
Voted
MSWIM
2009
ACM
15 years 11 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
COMCOM
2010
276views more  COMCOM 2010»
15 years 5 months ago
Adjustable convergecast tree protocol for wireless sensor networks
For data-collection applications in sensor networks, it is important to ensure base station receives a complete picture about the monitored area. Convergecast is an important commu...
Tzung-Shi Chen, Hua-Wen Tsai, Chih-Ping Chu