Sciweavers

2282 search results - page 320 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
116
Voted
ICDCS
2007
IEEE
15 years 11 months ago
Temporal Privacy in Wireless Sensor Networks
Although the content of sensor messages describing “events of interest” may be encrypted to provide confidentiality, the context surrounding these events may also be sensitiv...
Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong ...
EUC
2005
Springer
15 years 10 months ago
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions
Some sensor applications are interested in collecting data from multiple regions. For supporting such applications with multiple target regions, most conventional protocols are bas...
Young-Mi Song, Sung-Hee Lee, Young-Bae Ko
159
Voted
IPSN
2010
Springer
15 years 1 months ago
i-MAC - a MAC that learns
Traffic patterns in manufacturing machines exhibit strong temporal correlations due to the underlying repetitive nature of their operations. A MAC protocol can potentially learn t...
Krishna Kant Chintalapudi
JCM
2008
134views more  JCM 2008»
15 years 4 months ago
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network
Abstract-- Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly...
Li Xu, Jianwei Chen, Xiaoding Wang
ICRA
2009
IEEE
185views Robotics» more  ICRA 2009»
15 years 11 months ago
Ad-hoc wireless network coverage with networked robots that cannot localize
— We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless ...
Nikolaus Correll, Jonathan Bachrach, Daniel Vicker...